
CVE-2021-26038 – [20210704] - Core - Privilege escalation through com_installer
https://notcve.org/view.php?id=CVE-2021-26038
07 Jul 2021 — An issue was discovered in Joomla! 2.5.0 through 3.9.27. Install action in com_installer lack the required hardcoded ACL checks for superusers. A default system is not affected cause the default ACL for com_installer is limited to super users already. Se ha detectado un problema en Joomla! • https://developer.joomla.org/security-centre/859-20210704-core-privilege-escalation-through-com-installer.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVE-2021-26037 – [20210703] - Core - Lack of enforced session termination
https://notcve.org/view.php?id=CVE-2021-26037
07 Jul 2021 — An issue was discovered in Joomla! 2.5.0 through 3.9.27. CMS functions did not properly termine existing user sessions when a user's password was changed or the user was blocked. Se ha detectado un problema en Joomla! versiones 2.5.0 hasta 3.9.27. • https://developer.joomla.org/security-centre/858-20210703-core-lack-of-enforced-session-termination.html • CWE-613: Insufficient Session Expiration •

CVE-2021-26036 – [20210702] - Core - DoS through usergroup table manipulation
https://notcve.org/view.php?id=CVE-2021-26036
07 Jul 2021 — An issue was discovered in Joomla! 2.5.0 through 3.9.27. Missing validation of input could lead to a broken usergroups table. Se ha detectado un problema en Joomla! versiones 2.5.0 hasta 3.9.27. • https://developer.joomla.org/security-centre/857-20210702-core-dos-through-usergroup-table-manipulation.html • CWE-20: Improper Input Validation •

CVE-2021-26035 – [20210701] - Core - XSS in JForm Rules field
https://notcve.org/view.php?id=CVE-2021-26035
07 Jul 2021 — An issue was discovered in Joomla! 3.0.0 through 3.9.27. Inadequate escaping in the rules field of the JForm API leads to a XSS vulnerability. Se ha detectado un problema en Joomla! versiones 3.0.0 hasta 3.9.27. • https://developer.joomla.org/security-centre/856-20210701-core-xss-in-jform-rules-field.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-26034 – [20210503] - Core - CSRF in data download endpoints
https://notcve.org/view.php?id=CVE-2021-26034
26 May 2021 — An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in data download endpoints in com_banners and com_sysinfo. Se detectó un problema en Joomla! versiones 3.0.0 hasta 3.9.26. • https://developer.joomla.org/security-centre/854-20210503-core-csrf-in-data-download-endpoints.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2021-26033 – [20210502] - Core - CSRF in AJAX reordering endpoint
https://notcve.org/view.php?id=CVE-2021-26033
26 May 2021 — An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in the AJAX reordering endpoint. Se detectó un problema en Joomla! versiones 3.0.0 hasta 3.9.26. • https://developer.joomla.org/security-centre/853-20210502-core-csrf-in-ajax-reordering-endpoint.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2021-26032 – [20210501] - Core - Adding HTML to the executable block list of MediaHelper::canUpload
https://notcve.org/view.php?id=CVE-2021-26032
26 May 2021 — An issue was discovered in Joomla! 3.0.0 through 3.9.26. HTML was missing in the executable block list of MediaHelper::canUpload, leading to XSS attack vectors. Se detectó un problema en Joomla! versiones 3.0.0 hasta 3.9.26. • https://developer.joomla.org/security-centre/852-20210501-core-adding-html-to-the-executable-block-list-of-mediahelper-canupload.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-26031 – [20210402] - Core - Inadequate filters on module layout settings
https://notcve.org/view.php?id=CVE-2021-26031
14 Apr 2021 — An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI. Se detectó un problema en Joomla! versiones 3.0.0 hasta 3.9.25. • https://developer.joomla.org/security-centre/851-20210402-core-inadequate-filters-on-module-layout-settings.html •

CVE-2021-26030 – [20210401] - Core - Escape xss in logo parameter error pages
https://notcve.org/view.php?id=CVE-2021-26030
14 Apr 2021 — An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page Se detectó un problema en Joomla! versiones 3.0.0 hasta 3.9.25. El escape inadecuado permitió ataques de tipo XSS, usando el parámetro logo de las plantillas predeterminadas en la página de error • https://developer.joomla.org/security-centre/850-20210401-core-escape-xss-in-logo-parameter-error-pages.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-26029 – [20210309] - Core - Inadequate filtering of form contents could allow to overwrite the author field
https://notcve.org/view.php?id=CVE-2021-26029
04 Mar 2021 — An issue was discovered in Joomla! 1.6.0 through 3.9.24. Inadequate filtering of form contents could allow to overwrite the author field. Se detectó un problema en Joomla! versiones 1.6.0 hasta 3.9.24. • https://developer.joomla.org/security-centre/849-20210309-core-inadequate-filtering-of-form-contents-could-allow-to-overwrite-the-author-field.html •