CVE-2020-35125
Description
A cross-site scripting (XSS) vulnerability in the forms component of Mautic before 3.2.4 allows remote attackers to inject executable JavaScript via mautic[return] (a different attack method than CVE-2020-35124, but also related to the Referer concept).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2020-35125 is a stored XSS in Mautic's forms component via the mautic[return] parameter, allowing unauthenticated attackers to inject JavaScript and potentially escalate to RCE.
The vulnerability is a cross-site scripting (XSS) flaw in the forms component of Mautic, an open-source marketing automation platform. The issue arises because the application improperly sanitizes the mautic[return] parameter, which is used to capture referrer information when a lead submits a form. An attacker can inject arbitrary JavaScript into this parameter, which is then stored and executed in the context of the Mautic application. This is distinct from CVE-2020-35124 but shares a similar attack vector related to the Referer header [1][4].
Exploitation does not require authentication; an unauthenticated attacker can craft a malicious link that includes a JavaScript payload in the mautic[return] parameter. When a lead (victim) clicks the link and submits a form, the payload is stored. The stored XSS can then be triggered when an administrator views the form submission data in the Mautic backend, leading to execution of the attacker's script in the admin's browser [1].
The impact is critical because the XSS can be chained with other vulnerabilities to achieve remote code execution. According to the Horizon3.ai disclosure, an attacker can leverage the stored XSS to steal admin session cookies or perform actions on behalf of an admin, ultimately gaining full control of the Mautic instance. This could lead to data exfiltration, server compromise, and further lateral movement [1].
The vulnerability is fixed in Mautic version 3.2.4. Users are strongly advised to update to the latest version. As of the disclosure, approximately 6,000 instances were found exposed via Shodan, highlighting the widespread risk. No workarounds are mentioned; upgrading is the recommended remediation [1][4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mautic/corePackagist | < 2.16.5 | 2.16.5 |
mautic/corePackagist | >= 3.0.0, < 3.2.4 | 3.2.4 |
Affected products
2- Mautic/Mauticdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-42q7-95j7-w62mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-35125ghsaADVISORY
- forum.mautic.org/c/announcements/16ghsax_refsource_MISCWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/mautic/core/CVE-2020-35125.yamlghsaWEB
- github.com/mautic/mautic/security/advisories/GHSA-42q7-95j7-w62mghsax_refsource_MISCWEB
- packagist.org/packages/mautic/coreghsaWEB
- www.horizon3.ai/disclosures/mautic-unauth-xss-to-rceghsax_refsource_MISCWEB
- www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.