
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical information disclosure vulnerability was discovered in Joomla! versions 4.0.0 through 4.2.3, identified as CVE-2022-27912. The vulnerability allowed sites with publicly enabled debug mode to expose data from previous requests. The issue was reported on October 13, 2022, and was fixed on October 25, 2022, with the release of Joomla! version 4.2.4 (Joomla Security).
The vulnerability was classified with a critical impact but low severity and probability. The exploit type was identified as Information Disclosure, affecting the core functionality of Joomla! CMS. The issue specifically manifested when debug mode was publicly enabled, allowing unauthorized access to previous request data (Joomla Security).
When exploited, the vulnerability could lead to the exposure of sensitive information from previous requests made to the Joomla! site. This information disclosure could potentially reveal critical system data to unauthorized users when debug mode was enabled (Joomla Security).
The vulnerability was addressed in Joomla! version 4.2.4. The recommended solution is to upgrade to this version or later. Until the upgrade can be performed, administrators should ensure that debug mode is not publicly enabled on their Joomla! installations (Joomla Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."