{"vulnerability": "CVE-2022-25770", "sightings": [{"uuid": "5c45e0d1-1dfb-4734-a49e-1dc85d3d1892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25770", "type": "seen", "source": "https://t.me/cvedetector/6036", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-25770 - Mautic Upgrade Script Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2022-25770 \nPublished : Sept. 18, 2024, 10:15 p.m. | 39\u00a0minutes ago \nDescription : Mautic allows you to update the application via an upgrade script.  \n  \nThe upgrade logic isn't shielded off correctly, which may lead to vulnerable situation.  \n  \nThis vulnerability is mitigated by the fact that Mautic needs to be installed in a certain way to be vulnerable. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T01:07:06.000000Z"}]}