First published: Mon Aug 05 2019(Updated: )
In Joomla! 3.9.7 and 3.9.8, inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option. In other words, the filter attribute in subform fields allows remote code execution. This is fixed in 3.9.9.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | =3.9.7 | |
Joomla | =3.9.7-rc | |
Joomla | =3.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14654 has a high severity rating due to its potential for remote code execution.
To fix CVE-2019-14654, you need to upgrade your Joomla! installation to version 3.9.9 or later.
CVE-2019-14654 affects Joomla! versions 3.9.7 and 3.9.8.
Not addressing CVE-2019-14654 increases the risk of unauthorized remote code execution on your Joomla! site.
CVE-2019-14654 can lead to significant security vulnerabilities, allowing attackers to execute arbitrary code on your server.