Security Announcements
This feed provides announcements of resolved security issues in Joomla! software releases.
For more information about the Joomla! Security Strike Team (JSST) and its processes, please review our Security article.
To report potential security issues, please follow the guidelines in the above referenced article. Please note that we are only able to provide support for the Joomla! CMS, Joomla! Framework, and *.joomla.org network of websites.
You can subscribe to notifications from this feed through a RSS reader.
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.2.6
- Exploit type: CSRF
- Reported Date: 2022-12-24
- Fixed Date: 2023-01-31
- CVE Number: CVE-2023-23750
Description
Affected Installs
Joomla! CMS versions 4.0.0-4.2.6
Solution
Upgrade to version 4.2.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.2.6
- Exploit type: Incorrect Access Control
- Reported Date: 2023-01-01
- Fixed Date: 2023-01-31
- CVE Number: CVE-2023-23751
Description
Affected Installs
Joomla! CMS versions 4.0.0-4.2.6
Solution
Upgrade to version 4.2.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.2.3
- Exploit type: Reflexted XSS
- Reported Date: 2022-10-07
- Fixed Date: 2022-10-25
- CVE Number: CVE-2022-27913
Description
Affected Installs
Joomla! CMS versions 4.0.0-4.2.3
Solution
Upgrade to version 4.2.4
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Critical
- Severity: Low
- Probability: Low
- Versions: 4.0.0-4.2.3
- Exploit type: Information Disclosure
- Reported Date: 2022-10-13
- Fixed Date: 2022-10-25
- CVE Number: CVE-2022-27912
Description
Affected Installs
Joomla! CMS versions 4.0.0-4.2.3
Solution
Upgrade to version 4.2.4
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 4.2.0
- Exploit type: Path Disclosure
- Reported Date: 2022-08-27
- Fixed Date: 2022-08-30
- CVE Number: CVE-2022-27911
Description
Affected Installs
Joomla! CMS versions 4.2.0
Solution
Upgrade to version 4.2.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla! / Joomla! Framework
- SubProject: CMS / archive
- Impact: Moderate
- Severity: Low
- Probability: Low
- Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: Path Traversal
- Reported Date: 2022-02-20
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23793
Description
Extracting an specifilcy crafted tar package could write files outside of the intended path.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 or 4.1.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla! / Joomla! Framework
- SubProject: CMS / filesystem
- Impact: Low
- Severity: Low
- Probability: Low
- Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: Path Disclosure
- Reported Date: 2021-02-17
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23794
Description
Uploading a file name of an excess length causes the error. This error brings up the screen with the path of the source code of the web application.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 or 4.1.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Probability: Low
- Versions: 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: Incorrect Access Control
- Reported Date: 2020-09-23
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23795
Description
A user row was not bound to a specific authentication mechanism which could under very special circumstances allow an account takeover.
Affected Installs
Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 or 4.1.1
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: Moderate
- Severity: Low
- Probability: Low
- Versions: 3.7.0 - 3.10.6
- Exploit type: XSS
- Reported Date: 2021-05-06
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23796
Description
Lack of input validation could allow an XSS attack using com_fields
Affected Installs
Joomla! CMS versions 3.7.0 - 3.10.6
Solution
Upgrade to version 3.10.7
Contact
The JSST at the Joomla! Security Centre.
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Probability: Low
- Versions: 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
- Exploit type: SQL Injection
- Reported Date: 2021-03-04
- Fixed Date: 2022-03-29
- CVE Number: CVE-2022-23797
Description
Inadequate filtering on the selected Ids on an request could resulted into an possible SQL injection.
Affected Installs
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Solution
Upgrade to version 3.10.7 & 4.1.1
Contact
The JSST at the Joomla! Security Centre.