QID 731293

Date Published: 2024-03-26

QID 731293: Joomla! AcyMailing Component Unrestricted File Upload Vulnerability

Joomla! is a free and open-source content management system written in PHP. It uses object oriented programming techniques and is built on a model-view-controller web application framework. It includes features such as page caching, RSS feeds, printable versions of pages, news flashes, blogs, polls, search, and support for language internationalization. AcyMailing is a emailing solution for Joomla!

Unrestricted upload of file with dangerous type vulnerability in AcyMailing component for Joomla that allows remote code execution.

Affected Versions:
AcyMailing (com_acym) component 6.7.0 prior to 8.5.0 for Joomla!

QID Detection Logic:
This unauthenticated detection verifies vulnerable versions of the component from the com_acy.xml file.

Note: This QID does not verify if extension is enabled or not hence QID is set to Practice

Successful exploitation allows an unauthenticated, remote attacker to upload malicious files allowing execution of malicious code on a targeted system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Customers are advised to update to AcyMailing 8.5.0 or later versions to remediate this vulnerability.
    Vendor References

    CVEs related to QID 731293

    Software Advisories
    Advisory ID Software Component Link
    AcyMailing 8.5.0 or later URL Logo extensions.joomla.org/extension/acymailing-starter/