CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
26.3%
According to its self-reported version, the instance of Joomla! running on the remote web server is 3.x prior to 3.10.16, 4.x prior to 4.4.6 or 5.x prior to 5.1.2. It is, therefore, affected by multiple vulnerabilities.
Inadequate input validation leads to XSS vulnerabilities in the accessiblemedia field. (CVE-2024-21729)
The fancyselect list field layout does not correctly escape inputs, leading to a self-XSS vector. (CVE-2024-21730)
Improper handling of input could lead to an XSS vector in the StringHelper::truncate method. (CVE-2024-21731)
The wrapper extensions do not correctly validate inputs, leading to XSS vectors. (CVE-2024-26279)
The Custom Fields component not correctly filter inputs, leading to a XSS vector. (CVE-2024-26278)
Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.
No source data
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21729
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21730
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21731
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26278
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26279
developer.joomla.org/security-centre/935-20240701-core-xss-in-accessible-media-selection-field
developer.joomla.org/security-centre/936-20240702-core-self-xss-in-fancyselect-list-field-layout.html
developer.joomla.org/security-centre/937-20240703-core-xss-in-stringhelper-truncate-method.html
developer.joomla.org/security-centre/938-20240704-core-xss-in-wrapper-extensions.html
developer.joomla.org/security-centre/939-20240705-core-xss-in-com-fields-default-field-value.html
www.joomla.org/announcements/release-news/5909-joomla-5-1-2-and-joomla-4-4-6-security-and-bug-fix-release.html
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
26.3%