Latest Joomla Vulnerabilities

[20231101] - Core - Exposure of environment variables
Joomla Joomla\!>=1.6.0<3.10.14
Joomla Joomla\!>=4.0.0<4.4.1
Joomla Joomla\!=5.0.0
An issue was discovered in Joomla! 4.2.0 through 4.3.1. The lack of rate limiting allowed brute force attacks against MFA methods.
Joomla Joomla\!>=4.2.0<4.3.2
An issue was discovered in Joomla! 4.2.0 through 4.3.1. Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen.
Joomla Joomla\!>=4.2.0<4.3.2
Joomla! Improper Access Control Vulnerability
Joomla Joomla\!>=4.0.0<=4.2.7
Joomla! Joomla!
An issue was discovered in Joomla! 4.0.0 through 4.2.6. A missing token check causes a CSRF vulnerability in the handling of post-installation messages.
Joomla Joomla\!>=4.0.0<=4.2.6
An issue was discovered in Joomla! 4.0.0 through 4.2.4. A missing ACL check allows non super-admin users to access com_actionlogs.
Joomla Joomla\!>=4.0.0<=4.2.4
[20221101] - Core - RXSS through reflection of user input in com_media
Joomla Joomla\!>=4.0.0<4.2.5
[20221002] - Core - RXSS through reflection of user input in headings
Joomla Joomla\!>=4.0.0<=4.2.3
[20221001] - Core - Debug Mode leaks full request payloads including passwords
Joomla Joomla\!>=4.0.0<=4.2.3
An issue was discovered in Joomla! 4.2.0. Multiple Full Path Disclosures because of missing '_JEXEC or die check' caused by the PSR12 changes.
Joomla Joomla\!=4.2.0
An issue was discovered in Joomla! 4.0.0 through 4.1.0. Possible XSS atack vector through SVG embedding in com_media.
Joomla Joomla\!>=4.0.0<=4.1.0
An issue was discovered in Joomla! 3.7.0 through 3.10.6. Lack of input validation could allow an XSS attack using com_fields.
Joomla Joomla\!>=3.7.0<=3.10.6
An issue was discovered in Joomla! 2.5.0 through 3.10.6 & 4.0.0 through 4.1.0. Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.
Joomla Joomla\!>=2.5.0<=3.10.6
Joomla Joomla\!>=4.0.0<=4.1.0
An issue was discovered in Joomla! 3.0.0 through 3.10.6 & 4.0.0 through 4.1.0. Inadequate filtering on the selected Ids on an request could resulted into an possible SQL injection.
Joomla Joomla\!>=3.0.0<=3.10.6
Joomla Joomla\!>=4.0.0<=4.1.0
Path Traversal within joomla/archive tar class
composer/joomla/archive<1.1.12>=2.0.0<2.0.1
Joomla Joomla\!>=3.0.0<=3.10.6
Joomla Joomla\!>=4.0.0<=4.1.0
XSS within joomla/filter class
composer/joomla/filter<1.4.4>=2.0.0<2.0.1
Joomla Joomla\!>=4.0.0<=4.1.0
Path Disclosure within joomla/filesystem class
composer/joomla/filesystem<1.6.2>=2.0.0<2.0.1
Joomla Joomla\!>=3.0.0<=3.10.6
Joomla Joomla\!>=4.0.0<=4.1.0
Variable Tampering within joomla/input class
composer/joomla/input>=2.0.0<2.0.2
Joomla Joomla\!>=4.0.0<=4.1.0
An issue was discovered in Joomla! 4.0.0. The media manager does not correctly check the user's permissions before executing a file deletion command.
Joomla Joomla\!=4.0.0
An issue was discovered in Joomla! 2.5.0 through 3.9.27. Missing validation of input could lead to a broken usergroups table.
Joomla Joomla\!>=2.5.0<=3.9.27
An issue was discovered in Joomla! 3.0.0 through 3.9.27. Inadequate escaping in the rules field of the JForm API leads to a XSS vulnerability.
Joomla Joomla\!>=3.0.0<=3.9.27
An issue was discovered in Joomla! 2.5.0 through 3.9.27. CMS functions did not properly termine existing user sessions when a user's password was changed or the user was blocked.
Joomla Joomla\!>=2.5.0<=3.9.27
Joomla Joomla\!>=3.0.0<=3.9.27
An issue was discovered in Joomla! 2.5.0 through 3.9.27. Install action in com_installer lack the required hardcoded ACL checks for superusers. A default system is not affected cause the default ACL f...
Joomla Joomla\!>=2.5.0<=3.9.27
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to ...
Joomla Joomla\!>=1.5.0<=1.5.15
Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching furt...
Joomla Joomla\!>=1.5.0<=1.5.15
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the dat...
Joomla Joomla\!>=1.5.0<=1.5.15
Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may help in launching further attacks. Joomla! Core versions 1.5...
Joomla Joomla\!>=1.5.0<=1.5.15
An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in data download endpoints in com_banners and com_sysinfo.
Joomla Joomla\!>=3.0.0<=3.9.26
An issue was discovered in Joomla! 3.0.0 through 3.9.26. HTML was missing in the executable block list of MediaHelper::canUpload, leading to XSS attack vectors.
Joomla Joomla\!>=3.0.0<=3.9.26
An issue was discovered in Joomla! 2.5.0 through 3.9.24. Missing filtering of messages showed to users that could lead to xss issues.
Joomla Joomla\!>=2.5.0<3.9.25
An issue was discovered in Joomla! 3.2.0 through 3.9.24. Usage of an insufficient length for the 2FA secret accoring to RFC 4226 of 10 bytes vs 20 bytes.
Joomla Joomla\!>=3.2.0<3.9.25
An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been r...
Joomla Joomla\!>=3.2.0<3.9.25
An issue was discovered in Joomla! 3.2.0 through 3.9.24. Missing input validation within the template manager.
Joomla Joomla\!>=3.2.0<3.9.25
An issue was discovered in Joomla! 3.0.0 through 3.9.24. com_media allowed paths that are not intended for image uploads
Joomla Joomla\!>=3.0.0<3.9.25
An issue was discovered in Joomla! 3.2.0 through 3.9.24. Usage of the insecure rand() function within the process of generating the 2FA secret.
Joomla Joomla\!>=3.2.0<3.9.25
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Incorrect ACL checks could allow unauthorized change of the category for an article.
Joomla Joomla\!>=3.0.0<3.9.25
An issue was discovered in Joomla! 1.6.0 through 3.9.24. Inadequate filtering of form contents could allow to overwrite the author field.
Joomla Joomla\!>=1.6.0<3.9.25
Path Traversal within joomla/archive zip class
composer/joomla/archive<1.1.10
Joomla Joomla\!>=3.0.0<3.9.25
An issue was discovered in Joomla! 2.5.0 through 3.9.24. Missing filtering of feed fields could lead to xss issues.
Joomla Joomla\!>=2.5.0<3.9.25
An issue was discovered in Joomla! 3.1.0 through 3.9.23. The lack of escaping of image-related parameters in multiple com_tags views cause lead to XSS attack vectors.
Joomla Joomla\!>=3.1.0<=3.9.23
An issue was discovered in Joomla! 3.0.0 through 3.9.23. The lack of ACL checks in the orderPosition endpoint of com_modules leak names of unpublished and/or inaccessible modules.
Joomla Joomla\!>=3.0.0<=3.9.23
An issue was discovered in Joomla! 1.7.0 through 3.9.22. Lack of input validation while handling ACL rulesets can cause write ACL violations.
Joomla Joomla\!>=1.7.0<=3.9.22
An issue was discovered in Joomla! 3.9.0 through 3.9.22. Improper handling of the username leads to a user enumeration attack vector in the backend login page.
Joomla Joomla\!>=3.9.0<=3.9.22
An issue was discovered in Joomla! 2.5.0 through 3.9.22. The globlal configuration page does not remove secrets from the HTML output, disclosing the current values.
Joomla Joomla\!>=2.5.0<=3.9.22
An issue was discovered in Joomla! 2.5.0 through 3.9.22. The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability.
Joomla Joomla\!>=2.5.0<=3.9.22
An issue was discovered in Joomla! 2.5.0 through 3.9.22. The autosuggestion feature of com_finder did not respect the access level of the corresponding terms.
Joomla Joomla\!>=2.5.0<=3.9.22
An issue was discovered in Joomla! 3.0.0 through 3.9.22. Improper filter blacklist configuration leads to a SQL injection vulnerability in the backend user list.
Joomla Joomla\!>=3.0.0<=3.9.22
An issue was discovered in Joomla! 2.5.0 through 3.9.22. A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability.
Joomla Joomla\!>=2.5.0<=3.9.22
Joomla Joomla\!>=3.0.0<3.9.21

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203