CVE-2014-7228
Akeeba Restore <3.3.4 - Info Disclosure
Title source: llmDescription
Akeeba Restore (restore.php), as used in Joomla! 2.5.4 through 2.5.25, 3.x through 3.2.5, and 3.3.0 through 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 through 4.0.2; Backup Professional for WordPress 1.0.b1 through 1.1.3; Solo 1.0.b1 through 1.1.2; Admin Tools Core and Professional 2.0.0 through 2.4.4; and CMS Update 1.0.a1 through 1.0.1, when performing a backup or update for an archive, does not delete parameters from $_GET and $_POST when it is cleansing $_REQUEST, but later accesses $_GET and $_POST using the getQueryParam function, which allows remote attackers to bypass encryption and execute arbitrary code via a command message that extracts a crafted archive.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/35033
metasploit
WORKING POC
EXCELLENT
by Johannes Dahse · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb
References (3)
Scores
EPSS
0.0607
EPSS Percentile
90.8%
Details
CWE
CWE-310
Status
published
Products (45)
joomla/joomla\!
2.5.4
joomla/joomla\!
2.5.5
joomla/joomla\!
2.5.6
joomla/joomla\!
2.5.7
joomla/joomla\!
2.5.8
joomla/joomla\!
2.5.9
joomla/joomla\!
2.5.10
joomla/joomla\!
2.5.11
joomla/joomla\!
2.5.12
joomla/joomla\!
2.5.13
... and 35 more
Published
Nov 03, 2014
Tracked Since
Feb 18, 2026