There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Low
- Versions: 3.7.0-3.10.15-elts, 4.0.0-4.4.5, 5.0.0-5.1.1
- Exploit type: XSS
- Reported Date: 2024-06-09
- Fixed Date: 2024-07-09
- CVE Number: CVE-2024-26278
Description
The Custom Fields component not correctly filter inputs, leading to a XSS vector.
Affected Installs
Joomla! CMS versions 3.7.0-3.10.15-elts, 4.0.0-4.4.5, 5.0.0-5.1.1
Solution
Upgrade to version 3.10.16-elts, 4.4.6 or 5.1.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Jesper den Boer
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Low
- Versions: 3.0.0-3.10.15-elts, 4.0.0-4.4.5, 5.0.0-5.1.1
- Exploit type: XSS
- Reported Date: 2024-06-08
- Fixed Date: 2024-07-09
- CVE Number: CVE-2024-26279
Description
The wrapper extensions do not correctly validate inputs, leading to XSS vectors.
Affected Installs
Joomla! CMS versions 3.0.0-3.10.15-elts, 4.0.0-4.4.5, 5.0.0-5.1.1
Solution
Upgrade to version 3.10.16-elts, 4.4.6 or 5.1.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Jesper den Boer
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Moderate
- Probability: Low
- Versions: 3.0.0-3.10.15-elts, 4.0.0-4.4.5, 5.0.0-5.1.1
- Exploit type: XSS
- Reported Date: 2024-06-08
- Fixed Date: 2024-07-09
- CVE Number: CVE-2024-21731
Description
Improper handling of input could lead to an XSS vector in the StringHelper::truncate method.
Affected Installs
Joomla! CMS versions 3.0.0-3.10.15-elts, 4.0.0-4.4.5, 5.0.0-5.1.1
Solution
Upgrade to version 3.10.16-elts, 4.4.6 or 5.1.2
Contact
The JSST at the Joomla! Security Centre.
Reported By: Jesper den Boer