Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Too many open browser tabs? This is still my favorite solution – and has been for years

      July 17, 2025

      This new browser won’t monetize your every move – how to try it

      July 17, 2025

      Pokémon has partnered with one of the biggest PC gaming brands again, and you can actually buy these accessories — but do you even want to?

      July 17, 2025

      AMD’s budget Ryzen AI 5 330 processor will introduce a wave of ultra-affordable Copilot+ PCs with its mobile 50 TOPS NPU

      July 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 17, 2025
      Recent

      The details of TC39’s last meeting

      July 17, 2025

      Notes Android App Using SQLite

      July 17, 2025

      How to Get Security Patches for Legacy Unsupported Node.js Versions

      July 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      KeySmith – SSH key management

      July 17, 2025
      Recent

      KeySmith – SSH key management

      July 17, 2025

      Pokémon has partnered with one of the biggest PC gaming brands again, and you can actually buy these accessories — but do you even want to?

      July 17, 2025

      AMD’s budget Ryzen AI 5 330 processor will introduce a wave of ultra-affordable Copilot+ PCs with its mobile 50 TOPS NPU

      July 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2024-47056 – Mautic Sensitive Information Disclosure

    CVE-2024-47056 – Mautic Sensitive Information Disclosure

    May 28, 2025

    CVE ID : CVE-2024-47056

    Published : May 28, 2025, 5:15 p.m. | 22 minutes ago

    Description : SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations.

    Sensitive Information Disclosure via .env File Exposure: The .env file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL.

    MitigationUpdate Mautic to the latest Mautic version.

    By default, Mautic does not use .env files for production data.

    For Apache users: Ensure your web server is configured to respect .htaccess files.

    For Nginx users: As Nginx does not inherently support .htaccess files, you must manually add a configuration block to your Nginx server configuration to deny access to .env files. Add the following to your Nginx configuration for the Mautic site:

    location ~ /.env {
    deny all;
    }

    After modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.

    Severity: 5.1 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-32801 – Kea Root Privilege Escalation Remote Code Execution
    Next Article CVE-2022-26424 – Apache Struts Command Injection

    Related Posts

    Development

    Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

    July 17, 2025
    Development

    CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

    July 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    7 reasons The Division 2 is a game you should be playing in 2025

    News & Updates

    CVE-2025-48953 – Umbraco File Upload Extension Bypass Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5511 – “Quequnlong Shiyi-Blog Remote Unauthorized File Access Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    SAP fixes suspected Netweaver zero-day exploited in attacks

    Security

    Highlights

    Amsam – image cropping tool

    May 28, 2025

    Amsam is a program exclusively for cropping photos based on aspect ratios. Change the aspect…

    Cracking the code: How to wow the acceptance committee at your next tech event

    April 18, 2025

    CVE-2025-31926 – LambertGroup Sticky Radio Player SQL Injection Vulnerability

    May 16, 2025

    Dotfiles Installer – install dotfiles with the minimum of fuss

    July 17, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.