There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla! / Joomla! Framework
- SubProject: CMS / filter
- Impact: Moderate
- Severity: Moderate
- Probability: Moderate
- Versions: 3.7.0-3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
- Exploit type: XSS
- Reported Date: 2023-11-22
- Fixed Date: 2024-02-20
- CVE Number: CVE-2024-21726
Description
Inadequate content filtering leads to XSS vulnerabilities in various components.
Affected Installs
Joomla! CMS versions 3.7.0-3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
Solution
Upgrade to version 3.10.15-elts, 4.4.3 or 5.0.3
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: High
- Probability: High
- Versions: 4.0.0-4.4.2, 5.0.0-5.0.2
- Exploit type: XSS
- Reported Date: 2024-01-30
- Fixed Date: 2024-02-20
- CVE Number: CVE-2024-21725
Description
Inadequate escaping of mail addresses lead to XSS vulnerabilities in various components.
Affected Installs
Joomla! CMS versions 4.0.0-4.4.2, 5.0.0-5.0.2
Solution
Upgrade to version 4.4.3 or 5.0.3
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Moderate
- Versions: 1.6.0-3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
- Exploit type: XSS
- Reported Date: 2024-01-09
- Fixed Date: 2024-02-20
- CVE Number: CVE-2024-21724
Description
Inadequate input validation for media selection fields lead to XSS vulnerabilities in various extensions.
Affected Installs
Joomla! CMS versions 1.6.0 - 3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
Solution
Upgrade to version 3.10.15-elts, 4.4.3 or 5.0.3
Contact
The JSST at the Joomla! Security Centre.