GK Blank - Multipurpose starter Joomla! template

Security Announcements

    • Project: Joomla!
    • SubProject: Framework
    • Impact: High
    • Severity: Low
    • Probability: Low
    • Versions:1.0.0-2.1.1, 3.0.0-3.3.1
    • Exploit type: SQL Injection
    • Reported Date: 2025-03-17
    • Fixed Date: 2025-04-02
    • CVE Number: CVE-2025-25226

    Description

    Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package.

    Affected Installs

    Database Package version: 1.0.0-2.1.1, 3.0.0-3.3.1

    Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used.

    Solution

    Upgrade to version 2.2.0 or 3.4.0

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Nicholas K. Dionysopoulos, akeeba.com
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Moderate
    • Probability: Moderate
    • Versions:4.0.0 - 4.4.12, 5.0.0 - 5.2.5
    • Exploit type: Authentication Bypass
    • Reported Date: 2025-03-20
    • Fixed Date: 2025-04-08
    • CVE Number: CVE-2025-25227

    Description

    Insufficient state checks lead to a vector that allows to bypass 2FA checks.

    Affected Installs

    Joomla! CMS versions: 1.0.0-2.1.1, 3.0.0-3.3.1

    Solution

    Upgrade to version 4.4.13 or 5.2.6

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Undisclosed Reporter
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Critical
    • Severity: Low
    • Probability: Low
    • Versions:4.0.0-4.4.11, 5.0.0-5.2.4
    • Exploit type: Malicious file upload
    • Reported Date: 2025-02-25
    • Fixed Date: 2025-03-10
    • CVE Number: CVE-2025-22213

    Description

    Inadequate checks in the Media Manager allowed users with "edit" privileges to create executable PHP files.

    Affected Installs

    Joomla! CMS versions 4.0.0-4.4.11, 5.0.0-5.2.4

    Solution

    Upgrade to version 4.4.12 or 5.2.5

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  ErPaciocco
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Moderate
    • Probability: Low
    • Versions:3.9.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2
    • Exploit type: ACL Violation
    • Reported Date: 2024-08-26
    • Fixed Date: 2025-01-07
    • CVE Number: CVE-2024-40749

    Description

    Improper Access Controls allows access to protected views.

    Affected Installs

    Joomla! CMS versions 3.9.0-3.10.19-elts, 4.0.0-4.4.9, 5.0.0-5.2.2

    Solution

    Upgrade to version 3.10.20-elts, 4.4.10 or 5.2.3

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Dominik Ziegelmüller
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Probability: Low
    • Versions:4.1.0-4.4.10, 5.0.0-5.2.3
    • Exploit type: SQL Injection
    • Reported Date: 2024-12-10
    • Fixed Date: 2025-02-18
    • CVE Number: CVE-2025-22207

    Description

    Improperly built order clauses lead to a SQL injection vulnerability in the backend task list of com_scheduler

    Affected Installs

    Joomla! CMS versions 4.1.0-4.4.10, 5.0.0-5.2.3

    Solution

    Upgrade to version 4.4.11 or 5.2.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Calum Hutton, snyk.io