CVE-2026-3105

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API. MitigationPlease update to 4.4.19, 5.2.10, 6.0.8, 7.0.1 or later. WorkaroundsNone. ReferencesIf you have any questions or comments about this advisory: Email us at security@mautic.org
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*

History

27 Feb 2026, 03:11

Type Values Removed Values Added
First Time Acquia
Acquia mautic
CPE cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
References () https://github.com/mautic/mautic/security/advisories/GHSA-r5j5-q42h-fc93 - () https://github.com/mautic/mautic/security/advisories/GHSA-r5j5-q42h-fc93 - Vendor Advisory, Mitigation

24 Feb 2026, 20:27

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-24 20:27

Updated : 2026-02-27 03:11


NVD link : CVE-2026-3105

Mitre link : CVE-2026-3105

CVE.ORG link : CVE-2026-3105


JSON object : View

Products Affected

acquia

  • mautic
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')