First published: Sat Feb 15 2025(Updated: )
A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'filter_email' parameter in the GDPR Erase Data Request search feature.
Credit: security@joomla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomsky JS Jobs | >=1.1.5<=1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22208 is considered a high severity vulnerability due to its ability to allow authenticated attackers to execute arbitrary SQL commands.
To fix CVE-2025-22208, update the JS Jobs plugin to a version later than 1.4.3.
CVE-2025-22208 affects authenticated Joomla users with administrator privileges using JS Jobs plugin versions 1.1.5 to 1.4.3.
CVE-2025-22208 allows for SQL injection attacks through the 'filter_email' parameter.
Yes, it is recommended to implement additional security measures like input validation and regular security audits even after patching CVE-2025-22208.