• Joomla!®
    • About us
    • Joomla Home
    • What is Joomla?
    • Benefits & Features
    • Project & Leadership
    • Trademark & Licensing
    • The Joomla Foundation
    • Support us
    • Contribute
    • Sponsor
    • Partner
    • Shop
  • Download & Extend
    • Downloads
    • Extensions
    • Languages
    • Get a free site
    • Get a domain
  • Discover & Learn
    • Documentation
    • Training
    • Certification
    • Site Showcase
    • Announcements
    • Blogs
    • Magazine
  • Community & Support
    • Community Portal
    • Events
    • User Groups
    • Forum
    • Service Providers Directory
    • Volunteers Portal
    • Vulnerable Extensions List
  • Developer Resources
    • Developer Network
    • Security Centre
    • Issue Tracker
    • GitHub
    • API Documentation
    • Joomla! Framework

Joomla! Extensions Directory™

Download
Launch
  • Home
  • Browse Extensions
    • Top Rated
    • Most Reviewed
    • New
    • Recently Updated
    • Compatible with J4
    • Compatible with J5
    • Compatible with J5 (with b/c plugin)
  • Search
  • Community
    • Meet the JED Team
    • Blog
    • JED Newsletter
    • Terms of Service
    • Help Joomla!
  • Support
    • Knowledgebase
    • Sponsor Joomla!
  • Vulnerable Extensions
    • About
    • Vulnerable Extensions
    • Resolved Extensions
    • Abandoned Extensions
    • Submit a Report
    • Submit an Update
    • Submit AbandonWare
    • JSON Feed
  • Log in
  • Register
  • Home
  • Vulnerable Extensions
  • Abandoned Extensions
  • vBiz WDMtech

vBiz WDMtech

Details
Category: Abandoned Extensions
Published: 13 October 2023

Extension name vBiz
Developer WDMtech
Reason you believe its abandoned Their web site is infected.
Also various reports of remote code execution for this extension that are several years old. https://www.exploit-db.com/exploits/46224
Extension url https://www.wdmtech.com/
Last known version number 1.0.7

Vulnerable Extensions
  • JEVents, 3.6.87, SQL Injection
  • osTicky2, , Other
  • EasyShop, 1.4.1, XSS (Cross Site Scripting)
  • LivingWord, , XSS (Cross Site Scripting)
  • Plugin Creative Gallery , , SQL Injection
  • Proforms Basic via sort_order parameter, , SQL Injection
  • EXTPLORER, 2.1.15, XSS (Cross Site Scripting)
  • LM-CUSTOM-ADMIN, , Other
  • admirror gallery, , XSS (Cross Site Scripting)
  • Proforms Basic Joomla Module, , Other
Resolved Extensions
  • Convert Forms, 4.4.10, XSS (Cross Site Scripting)
  • JS Jobs, 1.4.2, SQL Injection
  • Regularlabs Sourcer, pre version 12.00, Other/RFI
  • HikaShop, 5.1.1, XSS (Cross Site Scripting)
  • Advanced custom fields, 2.7.7, SQL Injection
  • Phoca Gallery, 5.0.0, XSS (Cross Site Scripting)
  • HikaShop Starter 4.7.5 [2308101603], HikaShop Starter 4.7.5 [2308101603], XSS (Cross Site Scripting)
  • LazyDbBackup, 3.9.0, Other
  • Virtual Classroom, , SQL Injection
  • bagallery , , Other

  • Joomla! on Twitter
  • Joomla! on Facebook
  • Joomla! on YouTube
  • Joomla! on LinkedIn
  • Joomla! on Pinterest
  • Joomla! on Instagram
  • Joomla! on GitHub
  • Home
  • About
  • Community
  • Forum
  • Extensions
  • Services
  • Docs
  • Developer
  • Shop
  • Accessibility Statement
  • Privacy Policy
  • Cookie Policy
  • Sponsor Joomla! with $5
  • Help Translate
  • Report an Issue
  • Log in

© 2005 - 2025 Open Source Matters, Inc. All Rights Reserved.

Rochen
Joomla! Hosting by Rochen
× We have detected that you are using an ad blocker. The Joomla! Project relies on revenue from these advertisements so please consider disabling the ad blocker for this domain.