Security Announcements
-
[20250401] - Framework - SQL injection vulnerability in quoteNameStr method of Database package
- Project: Joomla!
- SubProject: Framework
- Impact: High
- Severity: Low
- Probability: Low
- Versions:1.0.0-2.1.1, 3.0.0-3.3.1
- Exploit type: SQL Injection
- Reported Date: 2025-03-17
- Fixed Date: 2025-04-02
- CVE Number: CVE-2025-25226
Description
Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package.Affected Installs
Database Package version: 1.0.0-2.1.1, 3.0.0-3.3.1
Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used.
Solution
Upgrade to version 2.2.0 or 3.4.0
Contact
The JSST at the Joomla! Security Centre.
Reported By: Nicholas K. Dionysopoulos, akeeba.com -
[20250402] - Core - MFA Authentication Bypass
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Moderate
- Probability: Moderate
- Versions:4.0.0 - 4.4.12, 5.0.0 - 5.2.5
- Exploit type: Authentication Bypass
- Reported Date: 2025-03-20
- Fixed Date: 2025-04-08
- CVE Number: CVE-2025-25227
Description
Insufficient state checks lead to a vector that allows to bypass 2FA checks.Affected Installs
Joomla! CMS versions: 1.0.0-2.1.1, 3.0.0-3.3.1
Solution
Upgrade to version 4.4.13 or 5.2.6
Contact
The JSST at the Joomla! Security Centre.
Reported By: Undisclosed Reporter -
[20250301] - Core - Malicious file uploads via Media Manager
- Project: Joomla!
- SubProject: CMS
- Impact: Critical
- Severity: Low
- Probability: Low
- Versions:4.0.0-4.4.11, 5.0.0-5.2.4
- Exploit type: Malicious file upload
- Reported Date: 2025-02-25
- Fixed Date: 2025-03-10
- CVE Number: CVE-2025-22213
Description
Inadequate checks in the Media Manager allowed users with "edit" privileges to create executable PHP files.Affected Installs
Joomla! CMS versions 4.0.0-4.4.11, 5.0.0-5.2.4
Solution
Upgrade to version 4.4.12 or 5.2.5
Contact
The JSST at the Joomla! Security Centre.
Reported By: ErPaciocco -
[20250103] - Core - Read ACL violation in multiple core views
- Project: Joomla!
- SubProject: CMS
- Impact: Low
- Severity: Moderate
- Probability: Low
- Versions:3.9.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2
- Exploit type: ACL Violation
- Reported Date: 2024-08-26
- Fixed Date: 2025-01-07
- CVE Number: CVE-2024-40749
Description
Improper Access Controls allows access to protected views.Affected Installs
Joomla! CMS versions 3.9.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2
Solution
Upgrade to version 3.10.20-elts, 4.4.10 or 5.2.3
Contact
The JSST at the Joomla! Security Centre.
Reported By: Dominik Ziegelmüller -
[20250201] - Core - SQL injection vulnerability in Scheduled Tasks component
- Project: Joomla!
- SubProject: CMS
- Impact: High
- Severity: Low
- Probability: Low
- Versions:4.1.0-4.4.10, 5.0.0-5.2.3
- Exploit type: SQL Injection
- Reported Date: 2024-12-10
- Fixed Date: 2025-02-18
- CVE Number: CVE-2025-22207
Description
Improperly built order clauses lead to a SQL injection vulnerability in the backend task list of com_schedulerAffected Installs
Joomla! CMS versions 4.1.0-4.4.10, 5.0.0-5.2.3
Solution
Upgrade to version 4.4.11 or 5.2.4
Contact
The JSST at the Joomla! Security Centre.
Reported By: Calum Hutton, snyk.io