This feed provides announcements of resolved security issues in Joomla! software releases.
For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.
To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.
You can subscribe to notifications from this feed through a RSS reader.
Improper cache invalidation leads to disclosure of form contents.
Joomla! CMS versions 1.7.3-3.7.2
Upgrade to version 3.7.3
The JSST at the Joomla! Security Centre.
Missing CSRF token checks and improper input validation lead to an XSS vulnerability.
Joomla! CMS versions 1.7.3-3.7.2
Upgrade to version 3.7.3
The JSST at the Joomla! Security Centre.
Inadequate filtering of multibyte characters leads to XSS vulnerabilities in various components.
Joomla! CMS versions 1.5.0 through 3.6.5
Upgrade to version 3.7.3
The JSST at the Joomla! Security Centre.
Inadequate filtering of request data leads to a SQL Injection vulnerability.
Joomla! CMS versions 3.7.0
Upgrade to version 3.7.1
The JSST at the Joomla! Security Centre.
Multiple files caused full path disclosures on systems with enabled error reporting.
Joomla! CMS versions 3.4.0 through 3.6.5
Upgrade to version 3.7.0
The JSST at the Joomla! Security Centre.
Inadequate mime type checks allowed low-privilege users to upload swf files even if they were explicitly forbidden.
Joomla! CMS versions 3.2.0 through 3.6.5
Upgrade to version 3.7.0
The JSST at the Joomla! Security Centre.
Inadequate filtering of form contents lead allow to overwrite the author of an article.
Joomla! CMS versions 1.6.0 through 3.6.5
Upgrade to version 3.7.0
The JSST at the Joomla! Security Centre.
Inadequate escaping of file and folder names leads to XSS vulnerabilities in the template manager component.
Joomla! CMS versions 3.2.0 through 3.6.5
Upgrade to version 3.7.0
The JSST at the Joomla! Security Centre.
Inadequate filtering of specific HTML attributes leads to XSS vulnerabilities in various components.
Joomla! CMS versions 1.5.0 through 3.6.5
Upgrade to version 3.7.0
The JSST at the Joomla! Security Centre.
Inadequate filtering of multibyte characters leads to XSS vulnerabilities in various components.
Joomla! CMS versions 1.5.0 through 3.6.5
Upgrade to version 3.7.0
The JSST at the Joomla! Security Centre.