CVE-2015-8566:
Joomla! Framework Remote Code Injection Vulnerability
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82281%
CWE
Published
5/17/2022
Updated
4/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
joomla/session | composer | < 1.3.1 | 1.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper neutralization of browser information (CWE-74) stored in session values. The Joomla security advisory explicitly states browser information wasn't filtered during session storage. Session initialization typically handles User-Agent
headers, and PHP
's unserialize()
operation on attacker-controlled data leads to object injection. The patched version 1.3.1 would have added filtering in this initialization path, aligning with the vulnerability pattern of unsafe session data handling.