WISSENSWERT

Sich Informationen aus dem Netz zu beschaffen ist gewöhnliche Alltagshandlung ... Stehen Sie berei
Das Internet ist dynamisches Wissen. Es gilt : Existenz durch Informationspräsenz.
Websites sind schlichtweg essenzieller und integraler Bestandteil moderner Kommunikation ...
Websites - Kein Medium sonst, bietet ein derart breites Spektrum an Kommunikations­kanälen
Joomla! - CMS für einfache Webseiten bis zu komplexen E-Commerce oder Social Marketing Sites für M
Minimalism is more than leaving stuff out, in fact ... minimalism is a state of mind.
Websites sind eine jederzeit leicht verfügbare Quelle an Information für Interessenten. Nutzen Sie
Es spielt eben doch eine Rolle, ob Ihr Unternehmen auch im Internet vertreten ist oder nicht!
40%-55% aller Internetsurfer sind heute mit mobilen Endgeräten im Netz.

Joomla! Developer News

  1. Joomla has always evolved through its community. But sustainable progress requires more than good ideas — it requires clear direction and visible priorities.

    Over the past months, we have worked to provide exactly that. The strategy sprint created alignment. The product strategydefined our framework. Today, we are moving into execution by making the official feature list public.

  2. Joomla 6.1 Beta 1

    The Joomla! Project is pleased to announce the availability of Joomla 6.1 Beta 1 for testing.

  3. Joomla 6.1 Alpha 3

    The Joomla! Project is pleased to announce the availability of Joomla 6.1 Alpha 3 for testing.

  4. Joomla 6.1 Alpha 2

    The Joomla! Project is pleased to announce the availability of Joomla 6.1 Alpha 2 for testing.

  5. Joomla 6.1 Alpha 1

    The Joomla! Project is pleased to announce the availability of the first Joomla 6.1 Alpha 1 for testing.

Joomla! Security Announcements

  • [20260101] - Core - Inadequate content filtering for data URLs
    06. Januar 2026
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Moderate
    • Probability: Low
    • Versions: 4.0.0-5.4.1, 6.0.0-6.0.1
    • Exploit type: XSS
    • Reported Date: 2025-11-14
    • Fixed Date: 2026-01-06
    • CVE Number: CVE-2025-63082

    Description

    Lack of input filtering leads to an XSS vector in the HTML filter code related to data URLs in img tags.

    Affected Installs

    Joomla! CMS versions 4.0.0-5.4.1, 6.0.0-6.0.1

    Solution

    Upgrade to version 5.4.2 or 6.0.2

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Sho Sugiyama of SUZUKI MOTOR CORPORATION
  • [20260102] - Core - XSS vectors in the pagebreak and pagenavigation plugins
    06. Januar 2026
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Moderate
    • Probability: Low
    • Versions: 3.9.0-5.4.1, 6.0.0-6.0.1
    • Exploit type: XSS
    • Reported Date: 2025-09-29
    • Fixed Date: 2026-01-06
    • CVE Number: CVE-2025-63083

    Description

    Lack of output escaping leads to a XSS vector in the pagebreak and pagenavigation plugins.

    Affected Installs

    Joomla! CMS versions 3.9.0-5.4.1, 6.0.0-6.0.1

    Solution

    Upgrade to version 5.4.2 or 6.0.2

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  peterhulst
  • [20250901] - Core - Inadequate content filtering within the checkAttribute filter code
    30. September 2025
    • Project: Joomla! / Joomla! Framework
    • SubProject: CMS / filter
    • Impact: Moderate
    • Severity: Moderate
    • Probability: Moderate
    • Versions: 3.0.0-3.10.20-elts, 4.0.0-4.4.13, 5.0.0-5.3.3
    • Exploit type: XSS
    • Reported Date: 2025-08-03
    • Fixed Date: 2025-09-30
    • CVE Number: CVE-2025-54476

    Description

    Inadequate content filtering within the checkAttribute methods leads to XSS vulnerabilities in various components.

    Affected Installs

    Joomla! CMS versions 3.0.0-3.10.20-elts, 4.0.0-4.4.13, 5.0.0-5.3.3

    Solution

    Upgrade to version 4.4.14 or 5.3.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Flydragon, Poi, Cwy, Xtrimi
  • [20250902] - Core - User-Enumeration in passkey authentication method
    30. September 2025
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Probability: Low
    • Versions: 4.0.0-4.4.13, 5.0.0-5.3.3
    • Exploit type: User Enumeration
    • Reported Date: 2025-09-04
    • Fixed Date: 2025-09-30
    • CVE Number: CVE-2025-54477

    Description

    Improper handling of authentication requests lead to a user enumeration vector in the passkey authentication method.

    Affected Installs

    Joomla! CMS versions 4.0.0-4.4.13, 5.0.0-5.3.3

    Solution

    Upgrade to version 4.4.14 or 5.3.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:  Marco Schubert