There is always a great deal of Joomla! development activity underway and communicating with other developers in the community is essential. This site is a resource for anyone looking to build or maintain software based on the Joomla! platform.
Where to Start
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Moderate
- Probability: Low
- Versions: 3.9.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2
- Exploit type: ACL Violation
- Reported Date: 2024-08-26
- Fixed Date: 2025-01-07
- CVE Number: CVE-2024-40749
Description
Improper Access Controls allows access to protected views.
Affected Installs
Joomla! CMS versions 3.9.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2
Solution
Upgrade to version 3.10.20-elts, 4.4.10 or 5.2.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Dominik Ziegelmüller
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Probability: Low
- Versions: 4.1.0-4.4.10, 5.0.0-5.2.3
- Exploit type: SQL Injection
- Reported Date: 2024-12-10
- Fixed Date: 2025-02-18
- CVE Number: CVE-2025-22207
Description
Improperly built order clauses lead to a SQL injection vulnerability in the backend task list of com_scheduler
Affected Installs
Joomla! CMS versions 4.1.0-4.4.10, 5.0.0-5.2.3
Solution
Upgrade to version 4.4.11 or 5.2.4
Contact
The JSST at the Joomla! Security Centre.
Reported By: Calum Hutton, snyk.io
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Moderate
- Probability: Low
- Versions: 3.0.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2
- Exploit type: XSS
- Reported Date: 2024-09-19
- Fixed Date: 2025-01-07
- CVE Number: CVE-2024-40748
Description
Lack of output escaping in the id attribute of menu lists.
Affected Installs
Joomla! CMS versions 3.0.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2
Solution
Upgrade to version 3.10.20-elts, 4.4.10 or 5.2.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Lokesh Dachepalli