- Description
- Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used.
- Source
- security@joomla.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2025-25226
@transilienceai
18 Apr 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CMS「Joomla」に関する2件の脆弱性(CVE-2025-25226・25227)が2025年4月9日に公開された。いずれも影響度は「高」とされ、SQLインジェクションやMFAバイパスの可能性がある。修正アップデートが提供されている。
@karukaruit
12 Apr 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CMSのJoomlaに関して、2件の脆弱性「CVE-2025-25227」「CVE-2025-25226」が明らかとなり脆弱性を修正したアップデートを提供。 前者はSQLインジェクション、後者は多要素認証をバイパスする脆弱性。 いずれも影響度の評価は高、一方重要度については中以下。
@karukaruit
12 Apr 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-25226 Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a prote… https://t.co/oVuQlklBbF
@CVEnew
8 Apr 2025
108 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C69B50FF-AD2E-4F47-BBB9-D6FAA51D0872",
"versionEndExcluding": "2.2.0",
"versionStartIncluding": "1.0.0"
},
{
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D89B0522-E39C-4031-994C-27E6C6AB69AA",
"versionEndExcluding": "3.4.0",
"versionStartIncluding": "3.0.0"
}
],
"operator": "OR"
}
]
}
]