There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Probability: Low
- Versions: 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: Incorrect Access Control
- Reported Date: 2020-09-23
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23795
Description
A user row was not bound to a specific authentication mechanism which could under very special circumstances allow an account takeover.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 or 4.1.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Low
- Probability: Low
- Versions: 3.7.0 - 3.10.6
- Exploit type: XSS
- Reported Date: 2021-05-06
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23796
Description
Lack of input validation could allow an XSS attack using com_fields
Affected Installs
Joomla! CMS versions 3.7.0 - 3.10.6
Solution
Upgrade to version 3.10.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Probability: Low
- Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: SQL Injection
- Reported Date: 2021-03-04
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23797
Description
Inadequate filtering on the selected Ids on an request could resulted into an possible SQL injection.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 & 4.1.1
Contact
The JSST at the Joomla! Security Centre.