An issue was discovered in Joomla! 4.2.0 through 4.3.1. Lack of input validation caused an open redirect and XSS issue within the new mfa selection screen.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.13%
Published
2023-05-30
Updated
2023-06-06
An issue was discovered in Joomla! 4.0.0 through 4.2.6. A missing token check causes a CSRF vulnerability in the handling of post-installation messages.
Source: Joomla! Project
Max CVSS
6.3
EPSS Score
0.06%
Published
2023-02-01
Updated
2023-02-08
An issue was discovered in Joomla! 4.0.0 through 4.2.4. Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in com_media.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.25%
Published
2022-11-08
Updated
2023-12-02
An issue was discovered in Joomla! 4.2.0 through 4.2.3. Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in various components.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.25%
Published
2022-10-25
Updated
2023-12-02
An issue was discovered in Joomla! 4.0.0 through 4.1.0. Possible XSS atack vector through SVG embedding in com_media.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.25%
Published
2022-03-30
Updated
2022-04-05
An issue was discovered in Joomla! 4.0.0 through 4.1.0. Inadequate content filtering leads to XSS vulnerabilities in various components.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.25%
Published
2022-03-30
Updated
2022-04-05
An issue was discovered in Joomla! 2.5.0 through 3.10.6 & 4.0.0 through 4.1.0. Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.12%
Published
2022-03-30
Updated
2022-04-05
An issue was discovered in Joomla! 3.7.0 through 3.10.6. Lack of input validation could allow an XSS attack using com_fields.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.19%
Published
2022-03-30
Updated
2022-04-05
An issue was discovered in Joomla! 3.0.0 through 3.9.27. Inadequate escaping in the imagelist view of com_media leads to a XSS vulnerability.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-07-07
Updated
2021-07-07
An issue was discovered in Joomla! 3.0.0 through 3.9.27. Inadequate escaping in the rules field of the JForm API leads to a XSS vulnerability.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-07-07
Updated
2021-07-07
An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in data download endpoints in com_banners and com_sysinfo.
Source: Joomla! Project
Max CVSS
6.5
EPSS Score
0.05%
Published
2021-05-26
Updated
2021-05-28
An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in the AJAX reordering endpoint.
Source: Joomla! Project
Max CVSS
6.5
EPSS Score
0.05%
Published
2021-05-26
Updated
2021-05-28
An issue was discovered in Joomla! 3.0.0 through 3.9.26. HTML was missing in the executable block list of MediaHelper::canUpload, leading to XSS attack vectors.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-05-26
Updated
2021-05-28
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-04-14
Updated
2021-04-22
An issue was discovered in Joomla! 2.5.0 through 3.9.24. Missing filtering of feed fields could lead to xss issues.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-03-04
Updated
2021-03-05
An issue was discovered in Joomla! 2.5.0 through 3.9.24. Missing filtering of messages showed to users that could lead to xss issues.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-03-04
Updated
2021-03-05
An issue was discovered in Joomla! 3.1.0 through 3.9.23. The lack of escaping of image-related parameters in multiple com_tags views cause lead to XSS attack vectors.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-01-12
Updated
2021-01-15
An issue was discovered in Joomla! 3.9.0 through 3.9.23. The lack of escaping in mod_breadcrumbs aria-label attribute allows XSS attacks.
Source: Joomla! Project
Max CVSS
6.1
EPSS Score
0.10%
Published
2021-01-12
Updated
2021-01-19
An issue was discovered in Joomla! 2.5.0 through 3.9.22. A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability.
Source: Joomla! Project
Max CVSS
6.8
EPSS Score
0.05%
Published
2020-12-28
Updated
2020-12-30
An issue was discovered in Joomla! before 3.9.21. Lack of escaping in mod_latestactions allows XSS attacks.
Source: MITRE
Max CVSS
6.1
EPSS Score
0.10%
Published
2020-08-26
Updated
2020-08-28
An issue was discovered in Joomla! before 3.9.21. Lack of input validation in the vote feature of com_content leads to an open redirect.
Source: MITRE
Max CVSS
6.1
EPSS Score
0.10%
Published
2020-08-26
Updated
2020-08-28
An issue was discovered in Joomla! through 3.9.19. A missing token check in the ajax_install endpoint of com_installer causes a CSRF vulnerability.
Source: MITRE
Max CVSS
6.8
EPSS Score
0.05%
Published
2020-07-15
Updated
2020-07-15
An issue was discovered in Joomla! through 3.9.19. Lack of input filtering and escaping allows XSS attacks in mod_random_image.
Source: MITRE
Max CVSS
6.1
EPSS Score
0.10%
Published
2020-07-15
Updated
2020-07-15
An issue was discovered in Joomla! through 3.9.19. A missing token check in the remove request section of com_privacy causes a CSRF vulnerability.
Source: MITRE
Max CVSS
6.8
EPSS Score
0.05%
Published
2020-07-15
Updated
2020-07-15
In Joomla! before 3.9.19, incorrect input validation of the module tag option in com_modules allows XSS.
Source: MITRE
Max CVSS
6.1
EPSS Score
0.10%
Published
2020-06-02
Updated
2020-06-03
98 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!