Description
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://www.acunetix.com/vulnerabilities/web/joomla-core-1-5-x-arbitrary-file-upload-1-5-0-1-5-15/
Vendor Advisory x_refsource_misc
https://developer.joomla.org/security-centre/310-20100423-core-installer-migration-script.html
Scores
CVSS v3
9.8
EPSS
0.0002
EPSS Percentile
4.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
joomla/joomla\!
1.5.0 - 1.5.15
Published
Jun 21, 2021
Tracked Since
Feb 18, 2026