Plattform
joomla
Komponente
joomla
Behoben in
2.13.4
CVE-2023-54363 describes a reflected cross-site scripting (XSS) vulnerability present in Joomla Solidres version 2.13.3. This flaw allows unauthenticated attackers to inject malicious JavaScript code into web pages by manipulating various GET parameters. Successful exploitation could lead to session hijacking, credential theft, or manipulation of website content, impacting user trust and data integrity. The vulnerability was published on 2026-04-09, and a fix is expected in a future release.
The XSS vulnerability in Joomla Solidres 2.13.3 is particularly concerning because it is unauthenticated, meaning an attacker doesn't need valid credentials to exploit it. They can craft malicious URLs containing JavaScript payloads within GET parameters like 'show', 'reviews', 'type_id', 'distance', 'facilities', 'categories', 'prices', 'location', and 'Itemid'. When a user clicks on this crafted link, the injected script executes in their browser context, allowing the attacker to steal their session cookies, potentially gaining access to their account. Furthermore, the attacker could inject scripts to modify the content displayed on the page, potentially leading to phishing attacks or defacement. The blast radius extends to all users who interact with vulnerable pages, especially those who click on links shared through external channels.
While no public exploits have been widely reported, the ease of exploitation due to the unauthenticated nature of the vulnerability and the availability of numerous GET parameters makes it a potential target for opportunistic attackers. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept code is likely to emerge given the simplicity of the attack vector. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.
Websites using Joomla CMS with the Solidres extension installed, particularly those with public-facing forms or search functionalities that rely on GET parameters. Shared hosting environments where multiple websites share the same server resources are also at increased risk, as a compromised website could potentially be used to attack other websites on the same server.
• joomla / wordpress: Review access logs for GET requests containing unusual or suspicious JavaScript code in parameters like 'show', 'reviews', 'type_id', 'distance', 'facilities', 'categories', 'prices', 'location', and 'Itemid'.
grep -i 'javascript:' /var/log/apache2/access.log |
grep 'solidres'• generic web: Use curl to test various GET parameters with JavaScript payloads and observe the response for signs of script execution.
curl 'https://example.com/solidres/?show=<script>alert("XSS")</script>'• generic web: Examine response headers for unexpected Content-Security-Policy (CSP) directives that might be bypassed by the XSS vulnerability.
curl -I https://example.com/solidres/disclosure
Exploit-Status
EPSS
0.07% (20% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2023-54363 is to upgrade Joomla Solidres to a patched version as soon as it becomes available. Until a patch is released, consider implementing input validation and output encoding on the affected GET parameters to sanitize user-supplied data. Web Application Firewalls (WAFs) can be configured with rules to detect and block malicious requests containing suspicious JavaScript payloads in the GET parameters. Regularly review and update Joomla and Solidres installations to ensure they are running the latest security patches. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple JavaScript payload through the affected GET parameters and verifying that it is properly sanitized.
Aktualisieren Sie das Joomla Solidres Plugin auf eine Version, die neuer als 2.13.3 ist, um die reflektierte XSS-Schwachstelle zu beheben. Überprüfen Sie die offizielle Solidres-Dokumentation oder die Joomla-Erweiterungs-Website für spezifische Aktualisierungsanweisungen. Validieren und escapen Sie außerdem alle Benutzereingaben ordnungsgemäß, um zukünftige XSS-Schwachstellen zu verhindern.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2023-54363 is a reflected cross-site scripting vulnerability in Joomla Solidres 2.13.3, allowing attackers to inject malicious scripts via manipulated GET parameters.
You are affected if you are using Joomla Solidres version 2.13.3 and your website is accessible to external users.
Upgrade Joomla Solidres to a patched version as soon as it becomes available. Implement input validation and output encoding as a temporary workaround.
There are currently no confirmed reports of active exploitation, but the vulnerability's ease of exploitation suggests it could be targeted in the future.
Refer to the official Joomla security advisories and the Solidres website for updates and information regarding the fix.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.