This feed provides announcements of resolved security issues in Joomla! software releases.
For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.
To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.
You can subscribe to notifications from this feed through a RSS reader.
Inadequate escaping of output leads to XSS vulnerability.
Joomla! versions 2.5.6 and all earlier 2.5.x versions
Upgrade to version 2.5.7
The JSST at the Joomla! Security Centre.
Inadequate escaping of output leads to XSS vulnerability in language switcher module.
Joomla! versions 2.5.6 and all earlier 2.5.x versions
Upgrade to version 2.5.7
The JSST at the Joomla! Security Centre.
Inadequate checking leads to possible user privilege escalation.
Joomla! versions 2.5.4 and all earlier 2.5.x versions
Upgrade to version 2.5.5
The JSST at the Joomla! Security Centre.
Inadequate filtering leads SQL error and information disclosure.
Joomla! versions 2.5.4 and all earlier 2.5.x versions
Upgrade to version 2.5.5
The JSST at the Joomla! Security Centre.
Inadequate permission checking allows unauthorised viewing of some administrative back end information.
Joomla! versions 2.5.3 and all earlier 2.5.x versions
Upgrade to version 2.5.4
The JSST at the Joomla! Security Centre.
Inadequate filtering in update manager leads to XSS vulnerability.
Joomla! versions 2.5.3 and all earlier 2.5.x versions
Upgrade to version 2.5.4
The JSST at the Joomla! Security Centre.
Insufficient randomness leads to password reset vulnerability.
Joomla! versions 1.5.25 and all earlier 1.5.x versions
Upgrade to version 1.5.26
The JSST at the Joomla! Security Centre.
Inadequate permission checking allows unauthorised viewing of administrative back end information.
Joomla! versions 1.5.25 and all earlier 1.5.x versions
Upgrade to version 1.5.26
The JSST at the Joomla! Security Centre.
Insufficient randomness leads to password reset vulnerability.
Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x versions
Upgrade to version 2.5.3
The JSST at the Joomla! Security Centre.
Programming error allows privilege escalation in some cases.
Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x versions
Upgrade to version 2.5.3
The JSST at the Joomla! Security Centre.