
Cloud Vulnerability DB
A community-led vulnerabilities database
An input validation vulnerability (CVE-2022-23796) was discovered in Joomla! versions 3.7.0 through 3.10.6. The vulnerability, reported on May 6, 2021 and fixed on March 29, 2022, stems from missing input validation within the com_fields class inputs component, which could potentially allow XSS (Cross-Site Scripting) attacks (Joomla Security).
The vulnerability is classified as moderate impact with low severity and probability. It affects the comfields component of Joomla! CMS and is specifically related to insufficient input validation that could lead to XSS attacks. The vulnerability has been assigned a CVSS v3.1 score of 9.8 (CRITICAL) ([NVD](https://nvd.nist.gov/vuln/search/results?advsearch=true&isCpeNameSearch=true&query=cpe%3A2.3%3Aa%3Ajoomla%3Ajoomla%5C%21%3A3.7.5%3A%3A%3A%3A%3A%3A%3A*)).
The vulnerability could allow attackers to perform XSS (Cross-Site Scripting) attacks through the com_fields component, potentially compromising the security of affected Joomla! installations (Joomla Security).
The vulnerability has been fixed in Joomla! version 3.10.7. Users of affected versions are advised to upgrade to this version or later to mitigate the security risk (Joomla Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."