VYPR
Critical severityNVD Advisory· Published Feb 9, 2021· Updated Aug 4, 2024

CVE-2020-35125

CVE-2020-35125

Description

A cross-site scripting (XSS) vulnerability in the forms component of Mautic before 3.2.4 allows remote attackers to inject executable JavaScript via mautic[return] (a different attack method than CVE-2020-35124, but also related to the Referer concept).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2020-35125 is a stored XSS in Mautic's forms component via the mautic[return] parameter, allowing unauthenticated attackers to inject JavaScript and potentially escalate to RCE.

The vulnerability is a cross-site scripting (XSS) flaw in the forms component of Mautic, an open-source marketing automation platform. The issue arises because the application improperly sanitizes the mautic[return] parameter, which is used to capture referrer information when a lead submits a form. An attacker can inject arbitrary JavaScript into this parameter, which is then stored and executed in the context of the Mautic application. This is distinct from CVE-2020-35124 but shares a similar attack vector related to the Referer header [1][4].

Exploitation does not require authentication; an unauthenticated attacker can craft a malicious link that includes a JavaScript payload in the mautic[return] parameter. When a lead (victim) clicks the link and submits a form, the payload is stored. The stored XSS can then be triggered when an administrator views the form submission data in the Mautic backend, leading to execution of the attacker's script in the admin's browser [1].

The impact is critical because the XSS can be chained with other vulnerabilities to achieve remote code execution. According to the Horizon3.ai disclosure, an attacker can leverage the stored XSS to steal admin session cookies or perform actions on behalf of an admin, ultimately gaining full control of the Mautic instance. This could lead to data exfiltration, server compromise, and further lateral movement [1].

The vulnerability is fixed in Mautic version 3.2.4. Users are strongly advised to update to the latest version. As of the disclosure, approximately 6,000 instances were found exposed via Shodan, highlighting the widespread risk. No workarounds are mentioned; upgrading is the recommended remediation [1][4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mautic/corePackagist
< 2.16.52.16.5
mautic/corePackagist
>= 3.0.0, < 3.2.43.2.4

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.