First published: Wed Dec 16 2015(Updated: )
Cross-site request forgery (CSRF) vulnerability in the com_templates component in Joomla! 3.2.0 through 3.3.x and 3.4.x before 3.4.6 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =3.2.0 | |
Joomla | =3.2.1 | |
Joomla | =3.2.2 | |
Joomla | =3.2.3 | |
Joomla | =3.2.4 | |
Joomla | =3.3.0 | |
Joomla | =3.3.1 | |
Joomla | =3.3.2 | |
Joomla | =3.3.3 | |
Joomla | =3.3.4 | |
Joomla | =3.3.5 | |
Joomla | =3.4.0 | |
Joomla | =3.4.1 | |
Joomla | =3.4.3 | |
Joomla | =3.4.4 | |
Joomla | =3.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8563 has been classified as a high severity vulnerability due to its potential to allow cross-site request forgery attacks.
To remediate CVE-2015-8563, you should upgrade Joomla! to version 3.4.6 or later.
Joomla! versions 3.2.0 through 3.4.5 are affected by CVE-2015-8563.
Yes, if your Joomla! installation is running any version between 3.2.0 and 3.4.5, it is vulnerable to CVE-2015-8563.
CVE-2015-8563 is classified as a cross-site request forgery (CSRF) vulnerability.