This feed provides announcements of resolved security issues in Joomla! software releases.
For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.
To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.
You can subscribe to notifications from this feed through a RSS reader.
Use of old version of Flash-based file uploader leads to XSS vulnerability.
Joomla! version 2.5.9 and earlier 2.5.x versions; and version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 2.5.10, 3.1.0 or 3.0.4.
The JSST at the Joomla! Security Center.
Inadequate permission checking allows unauthorised user to delete private messages.
Joomla! version 2.5.9 and earlier 2.5.x versions; and version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 2.5.10, 3.1.0 or 3.0.4.
The JSST at the Joomla! Security Center.
Object unserialize method leads to possible denial of service vulnerability.
Joomla! version 2.5.9 and earlier 2.5.x versions; and version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 2.5.10, 3.1.0 or 3.0.4.
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability in highlighter plugin.
Joomla! version 2.5.9 and earlier 2.5.x versions; and version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 2.5.10, 3.1.0 or 3.0.4.
The JSST at the Joomla! Security Center.
Method of encoding search terms led to possible information disclosure.
Joomla! version 3.0.2 and earlier 3.0.x versions; version 2.5.8 and earlier 2.5.x versions.
Upgrade to version 3.0.3 or 2.5.9.
The JSST at the Joomla! Security Centre.
Undefined variable caused information disclosure in some situations.
Joomla! version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 3.0.3.
The JSST at the Joomla! Security Centre.
Coding errors led to information disclosure in some situations.
Joomla! version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 3.0.3.
The JSST at the Joomla! Security Centre.
Inadequate protection leads to clickjacking vulnerability.
Joomla! version 3.0.1 and 3.0.0.
Upgrade to version 3.0.2
The JSST at the Joomla! Security Centre.
Inadequate protection leads to clickjacking vulnerability.
Joomla! version 2.5.7 and all earlier 2.5.x versions.
Upgrade to version 2.5.8
The JSST at the Joomla! Security Centre.
Typographical error leads to XSS vulnerability in language search component.
Joomla! version 3.0.0.
Upgrade to version 3.0.1
The JSST at the Joomla! Security Centre.