A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.2 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'fieldfor' parameter in the GDPR Field feature.
References
Link | Resource |
---|---|
https://decrypt.locker/obtaining-my-first-cve/ | Exploit Third Party Advisory |
https://joomsky.com/js-jobs-joomla/ | Product |
Configurations
History
04 Jun 2025, 20:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://decrypt.locker/obtaining-my-first-cve/ - Exploit, Third Party Advisory | |
References | () https://joomsky.com/js-jobs-joomla/ - Product | |
CPE | cpe:2.3:a:joomsky:js_jobs:*:*:*:*:*:joomla\!:*:* | |
First Time |
Joomsky js Jobs
Joomsky |
06 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
04 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
04 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-04 15:15
Updated : 2025-06-04 20:52
NVD link : CVE-2025-22206
Mitre link : CVE-2025-22206
CVE.ORG link : CVE-2025-22206
JSON object : View
Products Affected
joomsky
- js_jobs
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')