#VU61697 Code Injection in Joomla! - CVE-2022-23799
Published: March 29, 2022
Joomla!
Joomla!
Description
The vulnerability allows a remote attacker to manipulate the original query.
The vulnerability exists due to improper input validation when handling parameters of HTTP requests. Under specific circumstances, JInput pollutes method-specific input bags with $_REQUEST data. A remote attacker can send a specially crafted request and bypass intended security restrictions.