News Feeds

Security Announcements

  1. [20181005] - Core - CSRF hardening in com_installer
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 2.5.0 through 3.8.12
    • Exploit type: CSRF
    • Reported Date: 2018-September-26
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17858

    Description

    Added additional CSRF hardening in com_installer actions in the backend.

    Affected Installs

    Joomla! CMS versions 2.5.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Raviraj A. Powar
  2. [20181004] - Core - ACL Violation in com_users for the admin verification
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 1.5.0 through 3.8.12
    • Exploit type: ACL Violation
    • Reported Date: 2017-December-27
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17855

    Description

    In case that an attacker gets access to the mail account of an user who can approve admin verifications in the registration process he can activate himself.

    Affected Installs

    Joomla! CMS versions 1.5.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Paul Freeman
  3. [20181003] - Core - Access level Violation in com_tags
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 3.1.0 through 3.8.12
    • Exploit type: ACL Violation
    • Reported Date: 2018-June-20
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17857

    Description

    Inadequate checks on the tags search fields can lead to an access level violation.

    Affected Installs

    Joomla! CMS versions 3.1.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Андрей Капитанов
  4. [20181002] - Core - Inadequate default access level for com_joomlaupdate
    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Versions: 2.5.4 through 3.8.12
    • Exploit type: Object Injection
    • Reported Date: 2018-June-21
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17856

    Description

    Joomla’s com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled access of Administrator-level users to access com_joomlaupdate and trigger a code execution.

    Affected Installs

    Joomla! CMS versions 2.5.4 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Codesafescan
  5. [20181001] - Core - Hardening com_contact contact form
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 2.5.0 through 3.8.12
    • Exploit type: Incorrect Access Control
    • Reported Date: 2018-September-17
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17859

    Description

    Inadequate checks in com_contact could allowed mail submission in disabled forms.

    Affected Installs

    Joomla! CMS versions 2.5.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: David Jardin (JSST)

Daily Specials

Mondays

Tuesdays

Reflection Effect

Reflection script is incorporated in template. If you want an image to have it, use class "reflect" for your images. You can also control reflection's height and opacity.

Learn more about it here.

HOT Start

Follow our instructions to make a copy of this demo site to your server.

HOT Start! is available with each template. It allows you to create a copy of this demo.

Free Extension

Together with this template, you will get our Hot Photo Gallery Plugin ($9.95 value). It allows you to include series of images directly into your content pages. This plugin automatically creates thumbnails from your images. All you need to do is to select a folder with your images.

See it in action on this page

top