Users enumeration - weak password login
Description
When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak.
However when an incorrect username is provided alongside with a weak password, the application responds with ’Invalid credentials’ notification.
This difference could be used to perform username enumeration.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mautic login responses differ for correct vs incorrect usernames when using weak passwords, allowing username enumeration.
The vulnerability lies in the login response differentiation in Mautic. When a correct username is provided with a weak password, the application returns a message stating the password is too weak. However, if an incorrect username is combined with a weak password, the application responds with 'Invalid credentials' [2][3].
An attacker can exploit this by sending login requests with a list of potential usernames and a weak password. By observing the response, they can determine which usernames are valid. No authentication is needed to perform this enumeration, as it occurs during the login process [3].
The impact is that an attacker can enumerate valid usernames, which can then be used for targeted attacks such as credential stuffing or phishing. This does not directly lead to account compromise but increases the attack surface [2][3].
Mautic has patched this vulnerability in version 5.1.1. Users are advised to update to the latest version to prevent username enumeration [3]. If upgrading is not immediately possible, administrators should monitor login attempts for unusual patterns.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mautic/corePackagist | >= 5.1.0, < 5.1.1 | 5.1.1 |
Affected products
2- Mautic/Mauticv5Range: >= 5.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.