Description
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Exploits (13)
exploitdb
WORKING POC
VERIFIED
by Sec-1 · pythonwebappsphp
https://www.exploit-db.com/exploits/38977
exploitdb
WORKING POC
by Andrew McNicol · pythonwebappsphp
https://www.exploit-db.com/exploits/39033
nomisec
WORKING POC
2 stars
by RobinHoutevelts · poc
https://github.com/RobinHoutevelts/Joomla-CVE-2015-8562-PHP-POC
nomisec
WORKING POC
by lorenzodegiorgi · remote
https://github.com/lorenzodegiorgi/setup-cve-2015-8562
nomisec
WORKING POC
by thejackerz · poc
https://github.com/thejackerz/scanner-exploit-joomla-CVE-2015-8562
Nuclei Templates (1)
Joomla HTTP Header Unauthenticated - Remote Code Execution
HIGHby kairos-hk,bolkv,n0ming,RoughBoy0723
Shodan:
http.html:"joomla! - open source content management" || http.component:"joomla" || cpe:"cpe:2.3:a:joomla:joomla\!"
FOFA:
body="joomla! - open source content management"
References (9)
Scores
EPSS
0.9295
EPSS Percentile
99.8%
Lab Environment
Details
VulnCheck KEV
2015-12-16
InTheWild.io
2018-10-09
CWE
CWE-20
Status
published
Products (50)
joomla/joomla\!
1.5.0
joomla/joomla\!
1.5.1
joomla/joomla\!
1.5.2
joomla/joomla\!
1.5.3
joomla/joomla\!
1.5.4
joomla/joomla\!
1.5.6
joomla/joomla\!
1.5.7
joomla/joomla\!
1.5.8
joomla/joomla\!
1.5.9
joomla/joomla\!
1.5.10
... and 40 more
Published
Dec 16, 2015
Tracked Since
Feb 18, 2026