Security restrictions bypass in Joomla! - CVE-2018-17859
Published: October 10, 2018 / Updated: October 11, 2018
Joomla!
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.
The vulnerability exists due to insufficient security checks in the com_contact contact form feature. A remote attacker can submit specially crafted mail using disabled forms to bypass security restrictions and conduct further attacks.