There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Low
- Versions: 3.0.0 - 3.9.27
- Exploit type: XSS
- Reported Date: 2021-06-22
- Fixed Date: 2021-07-06
- CVE Number: CVE-2021-26039
Description
Inadequate escaping in the imagelist view of com_media leads to a XSS vulnerability.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.9.27
Solution
Upgrade to version 3.9.28
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Versions: 2.5.0 - 3.9.27
- Exploit type: Incorrect Access Control
- Reported Date: 2021-06-06
- Fixed Date: 2021-07-06
- CVE Number: CVE-2021-26038
Description
Install action in com_installer lack the required hardcoded ACL checks for superusers, leading to various potential attack vectors. A default system is not affected cause by default com_installer is limited to super users already.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.9.27
Solution
Upgrade to version 3.9.28
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Low
- Versions: 2.5.0 - 3.9.27
- Exploit type: Incorrect Session Handling
- Reported Date: 2019-02-08
- Fixed Date: 2021-07-06
- CVE Number: CVE-2021-26037
Description
Various CMS functions did not properly termine existing user sessions when a user's password was changed or the user was blocked.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.9.27
Solution
Upgrade to version 3.9.28
Contact
The JSST at the Joomla! Security Centre.