2026-04-01
Joomla
6.9
CVSS 4.0
Share
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
X
Lifecycle Timeline
3
Analysis Generated
Apr 01, 2026 - 10:00 vuln.today
EUVD ID Assigned
Apr 01, 2026 - 10:00 euvd
EUVD-2026-17855
CVE Published
Apr 01, 2026 - 09:03 nvd
MEDIUM 6.9
Tags
Description
Improperly built order clauses lead to a SQL injection vulnerability in the articles webservice endpoint.
Analysis
SQL injection in Joomla CMS articles webservice endpoint allows remote attackers to execute arbitrary SQL queries through improperly constructed ORDER BY clauses, affecting all versions of Joomla CMS. The vulnerability exists in the com_content component's webservice endpoint and permits unauthenticated query manipulation. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Priority Score
35
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +34
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2026-17855