CVE-2025-54476: Joomla! CMS vulnerable to XSS via the input filter
N/A
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
joomla/filter | composer | = 4.0.0 | 4.0.1 |
joomla/filter | composer | >= 3.0.0, < 3.0.5 | 3.0.5 |
joomla/filter | composer | < 2.0.6 | 2.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability lies in the checkAttribute
method of the Joomla\Filter\InputFilter
class. The provided patches clearly show that this function was modified to mitigate an XSS vulnerability. The core of the vulnerability is that the function failed to account for whitespace and other non-printable characters that could be used to obfuscate malicious JavaScript in HTML attributes. An attacker could craft an input like <img src="java\tscript:alert('xss')">
, which would bypass the original filter. The patch adds a line of code to strip these characters from the attribute value before it is checked for dangerous content. This directly points to checkAttribute
as the vulnerable function. The other modified files are test cases that confirm the fix by adding new tests for the previously successful XSS vectors.
Vulnerable functions
Joomla\Filter\InputFilter::checkAttribute
src/InputFilter.php