Joomla! Inadequate Checks Unauthorized Access Vulnerability



A vulnerability in the search fields of Joomla! could allow an authenticated, remote attacker to perform unauthorized actions on a targeted system.

The vulnerability is due to insufficient security checks of the tags search fields by the affected software. An attacker could exploit this vulnerability to bypass security restrictions and perform unauthorized actions on a targeted system. A successful exploit could be used to conduct further attacks.

Joomla! has confirmed the vulnerability and released software updates.

Security Impact Rating: Medium

CVE: CVE-2018-17857

Source:: Cisco Multivendor Vulnerability Alerts