There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.2.6
- Exploit type: CSRF
- Reported Date: 2022-12-24
- Fixed Date: 2023-01-31
- CVE Number: CVE-2023-23750
Description
A missing token check causes a CSRF vulnerability in the handling of post-installation messages.
Affected Installs
Joomla! CMS versions 4.0.0-4.2.6
Solution
Upgrade to version 4.2.7
Contact
The JSST at the Joomla! Security Centre.
Reported By: Faizan Wani
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.2.6
- Exploit type: Incorrect Access Control
- Reported Date: 2023-01-01
- Fixed Date: 2023-01-31
- CVE Number: CVE-2023-23751
Description
A missing ACL check allows non super-admin users to access com_actionlogs.
Affected Installs
Joomla! CMS versions 4.0.0-4.2.6
Solution
Upgrade to version 4.2.7
Contact
The JSST at the Joomla! Security Centre.
Reported By: Faizan Wani
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.2.3
- Exploit type: Reflexted XSS
- Reported Date: 2022-10-07
- Fixed Date: 2022-10-25
- CVE Number: CVE-2022-27913
Description
Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in various components.
Affected Installs
Joomla! CMS versions 4.0.0-4.2.3
Solution
Upgrade to version 4.2.4
Contact
The JSST at the Joomla! Security Centre.
Reported By: Ajith Menon