CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “joomla”

197 vulnerabilities found for “joomla”

Page 1 of 10

CVE-2025-27754
MEDIUM6.5

A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was discovered. The vulnerability allows authenticated users to inject malicious JavaScript into the plugin's resource. The injected payload is stored by the application and later executed when other users view the affected content.

rsjoomla / rsform\!blog
Network
Published Jun 5, 2025
Page 1 of 10
CVE-2025-27444
MEDIUM4.8

A reflected XSS vulnerability in RSform!Pro component 3.0.0 - 3.3.13 for Joomla was discovered. The issue arises from the improper handling of the filter[dateFrom] GET parameter, which is reflected unescaped in the administrative backend interface. This allows an authenticated attacker with admin or editor privileges to inject arbitrary JavaScript code by crafting a malicious URL.

rsjoomla / rsform\!pro
Network
Published Jun 4, 2025
CVE-2025-2714
MEDIUM4.3

A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /extensions/realestate/index.php/agents/agent-register/addagent. The manipulation of the argument plan_id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

joomlaux / jux_real_estate
Network
Published Mar 24, 2025
CVE-2025-2127
MEDIUM4.3

A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla. It has been classified as problematic. Affected is an unknown function of the file /extensions/realestate/index.php/properties/list/list-with-sidebar/realties. The manipulation of the argument Itemid/jp_yearbuilt leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

joomlaux / jux_real_estate
Network
Published Mar 9, 2025
CVE-2025-2126
MEDIUM6.3

A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla and classified as critical. This issue affects some unknown processing of the file /extensions/realestate/index.php/properties/list/list-with-sidebar/realties of the component GET Parameter Handler. The manipulation of the argument title leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

joomlaux / jux_real_estate
Network
Published Mar 9, 2025
CVE-2024-13899
HIGH7.2

The Mambo Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0 via deserialization of untrusted input via the $data parameter in the fImportMenu function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

misterpah / mambo_joomla_importer
Network
Published Feb 22, 2025
CVE-2023-49707
CRITICAL9.8

SQLi vulnerability in S5 Register module for Joomla.

joomlart / s5_register
Network
Published Dec 14, 2023
CVE-2023-44242
MEDIUM6.5

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 2J Slideshow Team Slideshow, Image Slider by 2J plugin <= 1.3.54 versions.

2joomla / 2j_slideshow
Network
Published Oct 2, 2023
CVE-2023-39987
MEDIUM5.9

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ajay Lulia wSecure Lite plugin <= 2.5 versions.

joomlaserviceprovider / wsecure
Network
Published Sep 4, 2023
CVE-2020-36729
MEDIUM5.4

The 2J-SlideShow Plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the 'twoj_slideshow_setup' function called via the wp_ajax_twoj_slideshow_setup AJAX action in versions up to, and including, 1.3.31. This makes it possible for authenticated attackers (Subscriber, or above level access) to allow attackers to perform otherwise restricted actions and subsequently deactivate any plugins on the blog.

2joomla / 2j_slideshow
Network
Published Jun 7, 2023
CVE-2016-15016
MEDIUM5.5

A vulnerability was found in mrtnmtth joomla_mod_einsatz_stats up to 0.2. It has been classified as critical. This affects the function getStatsByType of the file helper.php. The manipulation of the argument year leads to sql injection. Upgrading to version 0.3 is able to address this issue. The identifier of the patch is 27c1b443cff45c81d9d7d926a74c76f8b6ffc6cb. It is recommended to upgrade the affected component. The identifier VDB-217653 was assigned to this vulnerability.

joomla_mod_einsatz_stats_project / joomla_mod_einsatz_stats
Adjacent
Published Jan 8, 2023
CVE-2021-4226
CRITICAL9.8

RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.

rsjoomla / rsfirewall\!
Network
Published Dec 15, 2022
CVE-2022-29426
MEDIUM5.4

Authenticated (contributor or higher user role) Reflected Cross-Site Scripting (XSS) vulnerability in 2J Slideshow Team's Slideshow, Image Slider by 2J plugin <= 1.3.54 at WordPress.

2joomla / 2j_slideshow
Network
Published May 20, 2022
CVE-2022-23802
HIGH7.5

Joomla Guru extension 5.2.5 is affected by: Insecure Permissions. The impact is: obtain sensitive information (remote). The component is: Access to private information and components, possibility to view other users' information. Information disclosure Access to private information and components, possibility to view other users' information.

ijoomla / guru
Network
Published May 6, 2022
CVE-2016-10960
HIGH8.8

The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter.

joomlaserviceprovider / wsecure
Network
Published Sep 16, 2019
CVE-2018-17375
CRITICAL9.8

SQL Injection exists in the Music Collection 3.0.3 component for Joomla! via the id parameter.

joomlathat / music_collection
Network
Published Sep 28, 2018
CVE-2018-14592
CRITICAL9.8

The CWJoomla CW Article Attachments PRO extension before 2.0.7 and CW Article Attachments FREE extension before 1.0.6 for Joomla! allow SQL Injection within download.php.

cwjoomla / cw_article_attachments_free+1
Network
Published Sep 20, 2018
CVE-2018-6585
CRITICAL9.8

SQL Injection exists in the JTicketing 2.0.16 component for Joomla! via a view=events action with a filter_creator or filter_events_cat parameter.

techjoomla / jticketing
Network
Published Feb 17, 2018
CVE-2018-6370
CRITICAL9.8

SQL Injection exists in the NeoRecruit 4.1 component for Joomla! via the (1) PATH_INFO or (2) name of a .html file under the all-offers/ URI.

neojoomla / neorecruit
Network
Published Feb 17, 2018
CVE-2018-6397
HIGH7.5

Directory Traversal exists in the Picture Calendar 3.1.4 component for Joomla! via the list.php folder parameter.

joomlacalendars / picture_calendar
Network
Published Jan 30, 2018