
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability identified as CVE-2025-25227 was discovered in Joomla! CMS, affecting versions 4.0.0 through 4.4.12 and 5.0.0 through 5.2.5. The vulnerability was reported on March 20, 2025, and fixed on April 8, 2025. It involves insufficient state checks that create a vector allowing attackers to bypass Two-Factor Authentication (2FA) checks (Joomla Security).
The vulnerability has been assigned CWE-287 (Improper Authentication) classification. According to CISA's assessment, it received a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD Database).
The vulnerability allows attackers to bypass Two-Factor Authentication security measures, potentially compromising account security and system access controls. This authentication bypass could lead to unauthorized access to protected resources and administrative functions (Rapid7 Database).
The Joomla! Project has released security patches to address this vulnerability. Users are advised to upgrade to version 4.4.13 or 5.2.6, depending on their current installation version (Joomla Security).
The vulnerability has garnered significant attention in the security community, with multiple security firms and researchers discussing its implications. The Joomla Project promptly addressed the vulnerability by issuing security announcements and releasing patches (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."