First published: Tue Apr 08 2025(Updated: )
Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used.
Credit: security@joomla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Joomla Framework | ||
composer/joomla/database | >=1.0.0<2.2.0 | 2.2.0 |
composer/joomla/database | >=3.0.0<3.4.0 | 3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25226 is categorized as a SQL injection vulnerability which can potentially allow attackers to execute arbitrary SQL commands.
To address CVE-2025-25226, ensure to upgrade to the latest version of the Joomla Framework that includes a fix for this vulnerability.
CVE-2025-25226 affects the Joomla Framework, particularly its 2.x and 3.x branches, though the vulnerable method has no usage in the original packages.
Exploiting CVE-2025-25226 may allow an attacker to manipulate database queries, potentially revealing sensitive information or altering data.
CVE-2025-25226 is classified as a remote vulnerability, meaning it can be exploited from anywhere an attacker can send requests to the affected application.