Joomla! 2.5.x before 2.5.25, 3.x before 3.2.4, and 3.3.x before 3.3.4 allows remote attackers to authenticate and bypass intended access restrictions via vectors involving LDAP authentication.
2014-10-08T19:55:04.250
2025-04-12T10:46:40.837
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | joomla | joomla\! | 2.5.0 | Yes |
Application | joomla | joomla\! | 2.5.1 | Yes |
Application | joomla | joomla\! | 2.5.2 | Yes |
Application | joomla | joomla\! | 2.5.3 | Yes |
Application | joomla | joomla\! | 2.5.4 | Yes |
Application | joomla | joomla\! | 2.5.5 | Yes |
Application | joomla | joomla\! | 2.5.6 | Yes |
Application | joomla | joomla\! | 2.5.7 | Yes |
Application | joomla | joomla\! | 2.5.8 | Yes |
Application | joomla | joomla\! | 2.5.9 | Yes |
Application | joomla | joomla\! | 2.5.10 | Yes |
Application | joomla | joomla\! | 2.5.11 | Yes |
Application | joomla | joomla\! | 2.5.12 | Yes |
Application | joomla | joomla\! | 2.5.13 | Yes |
Application | joomla | joomla\! | 2.5.14 | Yes |
Application | joomla | joomla\! | 2.5.15 | Yes |
Application | joomla | joomla\! | 2.5.16 | Yes |
Application | joomla | joomla\! | 2.5.17 | Yes |
Application | joomla | joomla\! | 2.5.19 | Yes |
Application | joomla | joomla\! | 2.5.20 | Yes |
Application | joomla | joomla\! | 2.5.21 | Yes |
Application | joomla | joomla\! | 2.5.22 | Yes |
Application | joomla | joomla\! | 2.5.23 | Yes |
Application | joomla | joomla\! | 2.5.24 | Yes |
Application | joomla | joomla\! | 3.2.0 | Yes |
Application | joomla | joomla\! | 3.2.1 | Yes |
Application | joomla | joomla\! | 3.2.2 | Yes |
Application | joomla | joomla\! | 3.2.3 | Yes |
Application | joomla | joomla\! | 3.3.0 | Yes |
Application | joomla | joomla\! | 3.3.1 | Yes |
Application | joomla | joomla\! | 3.3.2 | Yes |
Application | joomla | joomla\! | 3.3.3 | Yes |