There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Low
- Versions: 2.5.0 - 3.9.27
- Exploit type: Incorrect Session Handling
- Reported Date: 2019-02-08
- Fixed Date: 2021-07-06
- CVE Number: CVE-2021-26037
Description
Various CMS functions did not properly termine existing user sessions when a user's password was changed or the user was blocked.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.9.27
Solution
Upgrade to version 3.9.28
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Versions: 2.5.0 - 3.9.27
- Exploit type: DoS
- Reported Date: 2021-06-08
- Fixed Date: 2021-07-06
- CVE Number: CVE-2021-26036
Description
Missing validation of input could lead to a broken usergroups table.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.9.27
Solution
Upgrade to version 3.9.28
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Versions: 3.0.0 - 3.9.27
- Exploit type: XSS
- Reported Date: 2021-05-29
- Fixed Date: 2021-07-06
- CVE Number: CVE-2021-26035
Description
Inadequate escaping in the Rules field of the JForm API leads to a XSS vulnerability.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.9.27
Solution
Upgrade to version 3.9.28
Contact
The JSST at the Joomla! Security Centre.