VYPR
Moderate severityNVD Advisory· Published Sep 18, 2024· Updated Sep 25, 2024

Users enumeration - weak password login

CVE-2024-47059

Description

When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak.

However when an incorrect username is provided alongside with a weak password, the application responds with ’Invalid credentials’ notification.

This difference could be used to perform username enumeration.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mautic login responses differ for correct vs incorrect usernames when using weak passwords, allowing username enumeration.

The vulnerability lies in the login response differentiation in Mautic. When a correct username is provided with a weak password, the application returns a message stating the password is too weak. However, if an incorrect username is combined with a weak password, the application responds with 'Invalid credentials' [2][3].

An attacker can exploit this by sending login requests with a list of potential usernames and a weak password. By observing the response, they can determine which usernames are valid. No authentication is needed to perform this enumeration, as it occurs during the login process [3].

The impact is that an attacker can enumerate valid usernames, which can then be used for targeted attacks such as credential stuffing or phishing. This does not directly lead to account compromise but increases the attack surface [2][3].

Mautic has patched this vulnerability in version 5.1.1. Users are advised to update to the latest version to prevent username enumeration [3]. If upgrading is not immediately possible, administrators should monitor login attempts for unusual patterns.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mautic/corePackagist
>= 5.1.0, < 5.1.15.1.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.