Joomla! 3.x < 5.4.4 Multiple Vulnerabilities

high Web App Scanning Plugin ID 115206

Synopsis

Joomla! 3.x < 5.4.4 Multiple Vulnerabilities

Description

According to its self-reported version, the instance of Joomla! running on the remote web server is 3.x prior to 5.4.4, or 6.x prior to 6.0.3. It is, therefore, affected by multiple vulnerabilities.

- An ACL hardening in com_ajax, the ajax component was excluded from the default logged-in-user check in the administrative area.

- An SQL injection in com_content articles webservice endpoint

- An XSS vector in com_associations comparison view

- An XSS vectors in various article title outputs

- An Arbitrary file deletion in com_joomlaupdate

- An Improper access check in webservice endpoints

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update to Joomla! version 5.4.4 or latest.

See Also

https://developer.joomla.org/security-centre/1027-20260301-core-acl-hardening-in-com-ajax.html

https://developer.joomla.org/security-centre/1028-20260302-core-sql-injection-in-com-content-articles-webservice-endpoint.html

https://developer.joomla.org/security-centre/1029-20260303-core-xss-vector-in-com-associations-comparison-view.html

https://developer.joomla.org/security-centre/1030-20260304-core-xss-vectors-in-various-article-title-outputs.html

https://developer.joomla.org/security-centre/1031-20260305-core-arbitrary-file-deletion-in-com-joomlaupdate.html

https://developer.joomla.org/security-centre/1032-20260306-core-improper-access-check-in-webservice-endpoints.html

https://www.joomla.org/announcements/release-news/5944-joomla-6-0-4-5-4-4-security-bugfix-release.html

Plugin Details

Severity: High

ID: 115206

Type: Version Based

Published: 4/3/2026

Updated: 4/3/2026

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2026-21629

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2026-21629

CVSS v4

Risk Factor: High

Base Score: 8.6

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2026-23898

Vulnerability Information

CPE: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 3/30/2026

Reference Information

CVE: CVE-2026-21629, CVE-2026-21630, CVE-2026-21631, CVE-2026-21632, CVE-2026-23898, CVE-2026-23899

CWE: 284, 73, 79, 89

OWASP: 2010-A1, 2010-A2, 2010-A4, 2010-A8, 2013-A1, 2013-A3, 2013-A4, 2013-A7, 2013-A9, 2017-A1, 2017-A5, 2017-A7, 2017-A9, 2021-A1, 2021-A3, 2021-A4, 2021-A6, 2025-A1, 2025-A5, 2025-A6

WASC: Cross-Site Scripting, Improper Input Handling, Insufficient Authorization, SQL Injection

CAPEC: 108, 109, 110, 13, 19, 209, 267, 441, 470, 478, 479, 502, 503, 536, 546, 550, 551, 552, 556, 558, 562, 563, 564, 578, 588, 591, 592, 63, 64, 66, 7, 72, 76, 78, 79, 80, 85

DISA STIG: APSC-DV-000460, APSC-DV-002490, APSC-DV-002540, APSC-DV-002560, APSC-DV-002630

HIPAA: 164.306(a)(1), 164.306(a)(2), 164.312(a)(1), 164.312(a)(2)(i)

ISO: 27001-A.13.1.1, 27001-A.14.1.2, 27001-A.14.1.3, 27001-A.14.2.5, 27001-A.18.1.3, 27001-A.6.2.2, 27001-A.9.1.2, 27001-A.9.4.1, 27001-A.9.4.4, 27001-A.9.4.5

NIST: sp800_53-AC-3, sp800_53-CM-6b, sp800_53-SI-10

OWASP API: 2019-API7, 2019-API8, 2023-API8

OWASP ASVS: 4.0.2-1.4.2, 4.0.2-12.3.2, 4.0.2-14.2.1, 4.0.2-5.3.3, 4.0.2-5.3.4

PCI-DSS: 3.2-6.2, 3.2-6.5.1, 3.2-6.5.7, 3.2-6.5.8