6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.003 Low
EPSS
Percentile
65.1%
According to its self-reported version, the instance of Joomla! running on the remote web server is 4.x prior to 4.2.4. It is, therefore, affected by multiple vulnerabilities.
Disclosure of critical information in debug mode. (CVE-2022-27912)
Cross-Site Scripting (XSS) through reflection of user input in headings. (CVE-2022-27913)
Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.
No source data
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27913
developer.joomla.org/security-centre/885-20221001-core-disclosure-of-critical-information-in-debug-mode.html
developer.joomla.org/security-centre/886-20221002-core-reflected-xss-in-various-components
www.joomla.org/announcements/release-news/5870-joomla-4-2-4-security-release.html
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.003 Low
EPSS
Percentile
65.1%