fkie_cve-2025-27754
Vulnerability from fkie_nvd
Published
2025-06-05 14:15
Modified
2025-06-16 17:28
Severity ?
Summary
A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was discovered. The vulnerability allows authenticated users to inject malicious JavaScript into the plugin's resource. The injected payload is stored by the application and later executed when other users view the affected content.
References
| URL | Tags | ||
|---|---|---|---|
| security@joomla.org | https://rsjoomla.com/ | Product |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| rsjoomla | rsform\!blog | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rsjoomla:rsform\\!blog:*:*:*:*:*:joomla\\!:*:*",
"matchCriteriaId": "CCFB0DFE-ACBA-42D3-9A44-19D6B57E415E",
"versionEndIncluding": "1.14.4",
"versionStartIncluding": "1.11.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was discovered. The vulnerability allows authenticated users to inject malicious JavaScript into the plugin\u0027s resource. The injected payload is stored by the application and later executed when other users view the affected content."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad XSS almacenado en el componente RSBlog! 1.11.6 - 1.14.4 para Joomla. Esta vulnerabilidad permite a usuarios autenticados inyectar JavaScript malicioso en el recurso del complemento. La aplicaci\u00f3n almacena el payload inyectado y lo ejecuta posteriormente cuando otros usuarios visualizan el contenido afectado."
}
],
"id": "CVE-2025-27754",
"lastModified": "2025-06-16T17:28:53.470",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-06-05T14:15:31.683",
"references": [
{
"source": "security@joomla.org",
"tags": [
"Product"
],
"url": "https://rsjoomla.com/"
}
],
"sourceIdentifier": "security@joomla.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security@joomla.org",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…