Matomo 0.6.4 Security Advisory CVE-2010-2786

Contents

An arbitrary file inclusion vulnerability is fixed by the latest Matomo (Piwik)
0.6.4 release.

Description:

Matomo versions 0.6 through 0.6.3 are vulnerable to arbitrary, remote
file inclusion using a directory traversal pattern in a crafted
request for a data renderer.

This vulnerability is rated critical, and Matomo users are strongly
encouraged to update to the latest version of Matomo.

The Matomo project and community thanks Enrico Razza for reporting the issue.

References:

  • CVE-2010-2786
Enjoyed this post?
Join the 160,000+ subscribers who receive the Matomo Newsletter straight to their inbox every month

Subscribe to our newsletter to receive regular information about Matomo. You can unsubscribe at any time from it. This service uses SendGrid. Learn more about it within our privacy Policy page.

Get started with Matomo

A powerful web analytics platform that gives you and your business 100% data ownership and user privacy protection.

Certified ISO 27001:2022

Certified ISO 27001:2022

Your analytics data is protected by globally recognised security standards.

Read more
Live websites using Matomo worldwide
0 K
Websites using Matomo including historical
0 M
Customer satisfaction
0 %

Own your data. Protect your privacy. Unlock better analytics.

Organisations should be able to understand their digital performance while mainteaning full ownership and control of their data.

No credit card required.