Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. joomla/input
  4. ›
  5. CVE-2022-23799

CVE-2022-23799: Variable Tampering within joomla/input class

March 31, 2022 (updated May 15, 2024)

An issue was discovered in Joomla! 4.0.0 through 4.1.0. Under specific circumstances, JInput pollutes method-specific input bags with $_REQUEST data.

References

  • developer.joomla.org/security-centre/876-20220307-core-variable-tampering-on-jinput-request-data.html
  • github.com/FriendsOfPHP/security-advisories/blob/master/joomla/input/CVE-2022-23799.yaml
  • github.com/advisories/GHSA-49fj-qp6p-q544
  • github.com/joomla-framework/input
  • github.com/joomla-framework/input/commit/2086df5860a2edccd77c329ee7cbd118cfe93514
  • github.com/joomla/joomla-cms/issues/35541
  • nvd.nist.gov/vuln/detail/CVE-2022-23799

Code Behaviors & Features

Detect and mitigate CVE-2022-23799 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 2.0.2

Fixed versions

  • 2.0.2

Solution

Upgrade to version 2.0.2 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Source file

packagist/joomla/input/CVE-2022-23799.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.