This feed provides announcements of resolved security issues in Joomla! software releases.

For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.

To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.

You can subscribe to notifications from this feed through a RSS reader.

  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Probability: Low
  • Versions: 4.0.0-4.2.4
  • Exploit type: Reflexted XSS
  • Reported Date: 2022-10-28
  • Fixed Date: 2022-11-08
  • CVE Number: CVE-2022-27914

Description

Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in com_media..

Affected Installs

Joomla! CMS versions 4.0.0-4.2.4

Solution

Upgrade to version 4.2.5

Contact

The JSST at the Joomla! Security Centre.

Reported By: https://github.com/Denitz
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Probability: Low
  • Versions: 4.0.0-4.2.3
  • Exploit type: Reflexted XSS
  • Reported Date: 2022-10-07
  • Fixed Date: 2022-10-25
  • CVE Number: CVE-2022-27913

Description

Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in various components.

Affected Installs

Joomla! CMS versions 4.0.0-4.2.3

Solution

Upgrade to version 4.2.4

Contact

The JSST at the Joomla! Security Centre.

Reported By: Ajith Menon
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Critical
  • Severity: Low
  • Probability: Low
  • Versions: 4.0.0-4.2.3
  • Exploit type: Information Disclosure
  • Reported Date: 2022-10-13
  • Fixed Date: 2022-10-25
  • CVE Number: CVE-2022-27912

Description

Joomla 4 sites with publicly enabled debug mode exposed data of previous requests.

Affected Installs

Joomla! CMS versions 4.0.0-4.2.3

Solution

Upgrade to version 4.2.4

Contact

The JSST at the Joomla! Security Centre.

Reported By: Peter Martin
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Probability: Low
  • Versions: 4.2.0
  • Exploit type: Path Disclosure
  • Reported Date: 2022-08-27
  • Fixed Date: 2022-08-30
  • CVE Number: CVE-2022-27911

Description

Multiple Full Path Disclosures because of missing '_JEXEC or die check' caused by the PSR12 changes done in 4.2.0. According to PROD2020/023 and in coordination with the JSST this has been patched in the public tracker vis #38615

Affected Installs

Joomla! CMS versions 4.2.0

Solution

Upgrade to version 4.2.1

Contact

The JSST at the Joomla! Security Centre.

Reported By: SharkyKZ
  • Project: Joomla! / Joomla! Framework
  • SubProject: CMS / archive
  • Impact: Moderate
  • Severity: Low
  • Probability: Low
  • Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
  • Exploit type: Path Traversal
  • Reported Date: 2022-02-20
  • Fixed Date: 2022-03-29
  • CVE Number: CVE-2022-23793

Description

Extracting an specifilcy crafted tar package could write files outside of the intended path.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

Solution

Upgrade to version 3.10.7 or 4.1.1

Contact

The JSST at the Joomla! Security Centre.

Reported By: Egidio Romano
  • Project: Joomla! / Joomla! Framework
  • SubProject: CMS / filesystem
  • Impact: Low
  • Severity: Low
  • Probability: Low
  • Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
  • Exploit type: Path Disclosure
  • Reported Date: 2021-02-17
  • Fixed Date: 2022-03-29
  • CVE Number: CVE-2022-23794

Description

Uploading a file name of an excess length causes the error. This error brings up the screen with the path of the source code of the web application.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

Solution

Upgrade to version 3.10.7 or 4.1.1

Contact

The JSST at the Joomla! Security Centre.

Reported By: DangKhai from Viettel Cyber Security
  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Probability: Low
  • Versions: 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
  • Exploit type: Incorrect Access Control
  • Reported Date: 2020-09-23
  • Fixed Date: 2022-03-29
  • CVE Number: CVE-2022-23795

Description

A user row was not bound to a specific authentication mechanism which could under very special circumstances allow an account takeover.

Affected Installs

Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0

Solution

Upgrade to version 3.10.7 or 4.1.1

Contact

The JSST at the Joomla! Security Centre.

Reported By: Phil Taylor
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Moderate
  • Severity: Low
  • Probability: Low
  • Versions: 3.7.0 - 3.10.6
  • Exploit type: XSS
  • Reported Date: 2021-05-06
  • Fixed Date: 2022-03-29
  • CVE Number: CVE-2022-23796

Description

Lack of input validation could allow an XSS attack using com_fields

Affected Installs

Joomla! CMS versions 3.7.0 - 3.10.6

Solution

Upgrade to version 3.10.7

Contact

The JSST at the Joomla! Security Centre.

Reported By: Hoàng Nguyễn
  • Project: Joomla!
  • SubProject: CMS
  • Impact: High
  • Severity: Low
  • Probability: Low
  • Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
  • Exploit type: SQL Injection
  • Reported Date: 2021-03-04
  • Fixed Date: 2022-03-29
  • CVE Number: CVE-2022-23797

Description

Inadequate filtering on the selected Ids on an request could resulted into an possible SQL injection.

Affected Installs

Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0

Solution

Upgrade to version 3.10.7 & 4.1.1

Contact

The JSST at the Joomla! Security Centre.

Reported By: Hoàng Nguyễn
  • Project: Joomla!
  • SubProject: CMS
  • Impact: Low
  • Severity: Low
  • Probability: Low
  • Versions: 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
  • Exploit type: Open redirect
  • Reported Date: 2021-03-23
  • Fixed Date: 2022-03-29
  • CVE Number: CVE-2022-23798

Description

Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.

Affected Installs

Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0

Solution

Upgrade to version 3.10.7 & 4.1.1

Contact

The JSST at the Joomla! Security Centre.

Reported By: Loïc LE MÉTAYER