Vulnerability Details : CVE-2019-14654
In Joomla! 3.9.7 and 3.9.8, inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option. In other words, the filter attribute in subform fields allows remote code execution. This is fixed in 3.9.9.
Vulnerability category: Execute code
Products affected by CVE-2019-14654
- cpe:2.3:a:joomla:joomla\!:3.9.7:-:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:joomla:joomla\!:3.9.7:rc:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-14654
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-14654
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2019-14654
-
https://developer.joomla.org/security-centre/787-20190701-core-filter-attribute-in-subform-fields-allows-remote-code-execution.html
[20190701] - Core - Filter attribute in subform fields allows remote code executionVendor Advisory
Jump to