Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.6
Mautic: Malicious SQL Code Can Be Injected through Contact Activity API
CVE-2026-3105
GHSA-r5j5-q42h-fc93
Summary
Mautic, a marketing automation platform, has a security weakness that allows hackers to inject malicious code into its database through its contact activity API. This could lead to unauthorized data access or even system compromise. To fix this, update to Mautic version 5.2.10, 6.0.8, or 7.0.1 or later.
What to do
- Update mautic core to version 5.2.10.
- Update mautic core to version 6.0.8.
- Update mautic core to version 7.0.1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| mautic | core | > 2.10.0 , <= 5.2.10 | 5.2.10 |
| mautic | core | > 6.0.0-alpha , <= 6.0.8 | 6.0.8 |
| mautic | core | > 7.0.0-alpha , <= 7.0.1 | 7.0.1 |
| acquia | mautic | > 2.10.0 , <= 4.4.19 | – |
| acquia | mautic | > 5.0.0 , <= 5.2.10 | – |
| acquia | mautic | > 6.0.0 , <= 6.0.8 | – |
| acquia | mautic | > 7.0.0 , <= 7.0.1 | – |
Original title
Mautic is Vulnerable to SQL Injection through Contact Activity API Sorting
Original description
### Summary
This advisory addresses a SQL Injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.
### Mitigation
Please update to **5.2.10**, **6.0.8**, **7.0.1** or later.
### Workarounds
None.
### References
If there are any questions or comments about this advisory:
Email Mautic at [[email protected]](mailto:[email protected])
This advisory addresses a SQL Injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via the API.
### Mitigation
Please update to **5.2.10**, **6.0.8**, **7.0.1** or later.
### Workarounds
None.
### References
If there are any questions or comments about this advisory:
Email Mautic at [[email protected]](mailto:[email protected])
nvd CVSS3.1
8.8
Vulnerability type
CWE-89
SQL Injection
- https://github.com/mautic/mautic/security/advisories/GHSA-r5j5-q42h-fc93 Vendor Advisory Mitigation
- https://nvd.nist.gov/vuln/detail/CVE-2026-3105
- https://github.com/mautic/mautic/releases/tag/5.2.10
- https://github.com/mautic/mautic/releases/tag/6.0.8
- https://github.com/mautic/mautic/releases/tag/7.0.1
- https://github.com/advisories/GHSA-r5j5-q42h-fc93
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026