There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Low
- Versions: 4.0.0-5.4.1, 6.0.0-6.0.1
- Exploit type: XSS
- Reported Date: 2025-11-14
- Fixed Date: 2026-01-06
- CVE Number: CVE-2025-63082
Description
Lack of input filtering leads to an XSS vector in the HTML filter code related to data URLs in img tags.
Affected Installs
Joomla! CMS versions 4.0.0-5.4.1, 6.0.0-6.0.1
Solution
Upgrade to version 5.4.2 or 6.0.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Sho Sugiyama of SUZUKI MOTOR CORPORATION
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Low
- Versions: 3.9.0-5.4.1, 6.0.0-6.0.1
- Exploit type: XSS
- Reported Date: 2025-09-29
- Fixed Date: 2026-01-06
- CVE Number: CVE-2025-63083
Description
Lack of output escaping leads to a XSS vector in the pagebreak and pagenavigation plugins.
Affected Installs
Joomla! CMS versions 3.9.0-5.4.1, 6.0.0-6.0.1
Solution
Upgrade to version 5.4.2 or 6.0.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: peterhulst
- Project: Joomla! / Joomla! Framework
- SubProject: CMS / filter
- Impact: Moderate
- Severity: Moderate
- Probability: Moderate
- Versions: 3.0.0-3.10.20-elts, 4.0.0-4.4.13, 5.0.0-5.3.3
- Exploit type: XSS
- Reported Date: 2025-08-03
- Fixed Date: 2025-09-30
- CVE Number: CVE-2025-54476
Description
Inadequate content filtering within the checkAttribute methods leads to XSS vulnerabilities in various components.
Affected Installs
Joomla! CMS versions 3.0.0-3.10.20-elts, 4.0.0-4.4.13, 5.0.0-5.3.3
Solution
Upgrade to version 4.4.14 or 5.3.4
Contact
The JSST at the Joomla! Security Centre.
Reported By: Flydragon, Poi, Cwy, Xtrimi