First published: Tue Jun 02 2020(Updated: )
In Joomla! before 3.9.19, missing token checks in com_postinstall lead to CSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla | >=3.7.1<3.9.19 | |
Joomla | =3.7.0 | |
Joomla | =3.7.0-alpha1 | |
Joomla | =3.7.0-alpha2 | |
Joomla | =3.7.0-beta1 | |
Joomla | =3.7.0-beta2 | |
Joomla | =3.7.0-beta3 | |
Joomla | =3.7.0-beta4 | |
Joomla | =3.7.0-rc1 | |
Joomla | =3.7.0-rc2 | |
Joomla | =3.7.0-rc3 | |
Joomla | =3.7.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13760 is classified as a medium severity vulnerability due to the potential for CSRF attacks.
To fix CVE-2020-13760, upgrade your Joomla! installation to version 3.9.19 or later.
CVE-2020-13760 affects Joomla! versions before 3.9.19, including all versions from 3.7.1 up to 3.9.18.
CVE-2020-13760 is a Cross-Site Request Forgery (CSRF) vulnerability due to missing token checks.
Yes, if exploited, CVE-2020-13760 could allow unauthorized actions on behalf of the user, potentially leading to data exposure.