Lack of input validation leads to an arbitrary file deletion vulnerability in the autoupdate server mechanism.
References
| Link | Resource |
|---|---|
| https://developer.joomla.org/security-centre/1031-20260305-core-arbitrary-file-deletion-in-com-joomlaupdate.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Apr 2026, 19:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:* | |
| References | () https://developer.joomla.org/security-centre/1031-20260305-core-arbitrary-file-deletion-in-com-joomlaupdate.html - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| First Time |
Joomla
Joomla joomla\! |
01 Apr 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 10:16
Updated : 2026-04-09 19:58
NVD link : CVE-2026-23898
Mitre link : CVE-2026-23898
CVE.ORG link : CVE-2026-23898
JSON object : View
Products Affected
joomla
- joomla\!
CWE
CWE-73
External Control of File Name or Path
