There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 1.5.0 - 3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
- Exploit type: Open Redirect
- Reported Date: 2023-11-08
- Fixed Date: 2024-02-20
- CVE Number: CVE-2024-21723
Description
Inadequate parsing of URLs could result into an open redirect.
Affected Installs
Joomla! CMS versions 1.5.0 - 3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
Solution
Upgrade to version 3.10.15-elts, 4.4.3 or 5.0.3
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 3.2.0-3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
- Exploit type: Insufficient Session Expiration
- Reported Date: 2023-11-29
- Fixed Date: 2024-02-20
- CVE Number: CVE-2024-21722
Description
The MFA management features did not properly terminate existing user sessions when a user's MFA methods have been modified.
Affected Installs
Joomla! CMS versions 3.2.0-3.10.14-elts, 4.0.0-4.4.2, 5.0.0-5.0.2
Solution
Upgrade to version 3.10.15-elts, 4.4.3 or 5.0.3
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: High
- Probability: Low
- Versions: 1.6.0-4.4.0, 5.0.0
- Exploit type: Information Disclosure
- Reported Date: 2023-07-14
- Fixed Date: 2023-11-21
- CVE Number: CVE-2023-40626
Description
The language file parsing process could be manipulated to expose environment variables. Environment variables might contain sensible information.
Affected Installs
Joomla! CMS versions 1.6.0-4.4.0, 5.0.0
Solution
Upgrade to version 3.10.14-elts, 4.4.1 or 5.0.1
Contact
The JSST at the Joomla! Security Centre.