There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.4.5, 5.0.0-5.1.1
- Exploit type: XSS
- Reported Date: 2024-06-03
- Fixed Date: 2024-07-09
- CVE Number: CVE-2024-21730
Description
The fancyselect list field layout does not correctly escape inputs, leading to a self-XSS vector.
Affected Installs
Joomla! CMS versions 4.0.0-4.4.5, 5.0.0-5.1.1
Solution
Upgrade to version 4.4.6 or 5.1.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Jesper den Boer
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Moderate
- Versions: 4.0.0-4.4.5, 5.0.0-5.1.1
- Exploit type: XSS
- Reported Date: 2024-02-20
- Fixed Date: 2024-07-09
- CVE Number: CVE-2024-21729
Description
Inadequate input validation leads to XSS vulnerabilities in the accessiblemedia field.
Affected Installs
Joomla! CMS versions 4.0.0-4.4.5, 5.0.0-5.1.1
Solution
Upgrade to version 4.4.6 or 5.1.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Marco Kadlubski
- Project: Joomla! / Joomla! Framework
- SubProject: CMS / filter
- Impact: Moderate
- Severity: Moderate
- Probability: Moderate
- Versions: 3.7.0-3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
- Exploit type: XSS
- Reported Date: 2023-11-22
- Fixed Date: 2024-02-20
- CVE Number: CVE-2024-21726
Description
Inadequate content filtering leads to XSS vulnerabilities in various components.
Affected Installs
Joomla! CMS versions 3.7.0-3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
Solution
Upgrade to version 3.10.15-elts, 4.4.3 or 5.0.3
Contact
The JSST at the Joomla! Security Centre.