• Joomla!®
    • About us
    • Joomla Home
    • What is Joomla?
    • Benefits & Features
    • Project & Leadership
    • Trademark & Licensing
    • The Joomla Foundation
    • Support us
    • Contribute
    • Sponsor
    • Partner
    • Shop
  • Download & Extend
    • Downloads
    • Extensions
    • Languages
    • Get a free site
    • Get a domain
  • Discover & Learn
    • Documentation
    • Training
    • Certification
    • Site Showcase
    • Announcements
    • Blogs
    • Magazine
  • Community & Support
    • Community Portal
    • Events
    • User Groups
    • Forum
    • Service Providers Directory
    • Volunteers Portal
    • Vulnerable Extensions List
  • Developer Resources
    • Developer Network
    • Security Centre
    • Issue Tracker
    • GitHub
    • API Documentation
    • Joomla! Framework

Joomla! Extensions Directory™

Download
Launch
  • Home
  • Browse Extensions
    • Top Rated
    • Most Reviewed
    • New
    • Recently Updated
    • Compatible with J4
    • Compatible with J5
    • Compatible with J5 (with b/c plugin)
  • Search
  • Community
    • Meet the JED Team
    • Blog
    • JED Newsletter
    • Terms of Service
    • Help Joomla!
  • Support
    • Knowledgebase
    • Sponsor Joomla!
  • Vulnerable Extensions
    • About
    • Vulnerable Extensions
    • Resolved Extensions
    • Abandoned Extensions
    • Submit a Report
    • Submit an Update
    • Submit AbandonWare
    • JSON Feed
  • Log in
  • Register
  • Home
  • Vulnerable Extensions
  • Resolved Extensions
  • xcloner,3.53,Other

xcloner,3.53,Other

Details
Category: Resolved Extensions
Published: 26 May 2020

xcloner,3.53,Other

Developer statement

Today we have made available a new release — version 3.5.4 — for the unmaintained Joomla version of XCloner.

Prior versions of XCloner for Joomla contained an Authenticated Local File Disclosure vulnerability that has been patched in the latest version. Any users of the unmaintained XCloner for Joomla package should upgrade immediately.

Details of the exploit have not been published to allow users time to upgrade.

Vulnerable Extensions
  • JEVents, 3.6.87, SQL Injection
  • osTicky2, , Other
  • EasyShop, 1.4.1, XSS (Cross Site Scripting)
  • LivingWord, , XSS (Cross Site Scripting)
  • Plugin Creative Gallery , , SQL Injection
  • Proforms Basic via sort_order parameter, , SQL Injection
  • EXTPLORER, 2.1.15, XSS (Cross Site Scripting)
  • LM-CUSTOM-ADMIN, , Other
  • admirror gallery, , XSS (Cross Site Scripting)
  • Proforms Basic Joomla Module, , Other
Resolved Extensions
  • Convert Forms, 4.4.10, XSS (Cross Site Scripting)
  • JS Jobs, 1.4.2, SQL Injection
  • Regularlabs Sourcer, pre version 12.00, Other/RFI
  • HikaShop, 5.1.1, XSS (Cross Site Scripting)
  • Advanced custom fields, 2.7.7, SQL Injection
  • Phoca Gallery, 5.0.0, XSS (Cross Site Scripting)
  • HikaShop Starter 4.7.5 [2308101603], HikaShop Starter 4.7.5 [2308101603], XSS (Cross Site Scripting)
  • LazyDbBackup, 3.9.0, Other
  • Virtual Classroom, , SQL Injection
  • bagallery , , Other

  • Joomla! on Twitter
  • Joomla! on Facebook
  • Joomla! on YouTube
  • Joomla! on LinkedIn
  • Joomla! on Pinterest
  • Joomla! on Instagram
  • Joomla! on GitHub
  • Home
  • About
  • Community
  • Forum
  • Extensions
  • Services
  • Docs
  • Developer
  • Shop
  • Accessibility Statement
  • Privacy Policy
  • Cookie Policy
  • Sponsor Joomla! with $5
  • Help Translate
  • Report an Issue
  • Log in

© 2005 - 2025 Open Source Matters, Inc. All Rights Reserved.

Rochen
Joomla! Hosting by Rochen
× We have detected that you are using an ad blocker. The Joomla! Project relies on revenue from these advertisements so please consider disabling the ad blocker for this domain.