• Joomla!®
    • About us
    • Joomla Home
    • What is Joomla?
    • Benefits & Features
    • Project & Leadership
    • Trademark & Licensing
    • The Joomla Foundation
    • Support us
    • Contribute
    • Sponsor
    • Partner
    • Shop
  • Download & Extend
    • Downloads
    • Extensions
    • Languages
    • Get a free site
    • Get a domain
  • Discover & Learn
    • Documentation
    • Training
    • Certification
    • Site Showcase
    • Announcements
    • Blogs
    • Magazine
  • Community & Support
    • Community Portal
    • Events
    • User Groups
    • Forum
    • Service Providers Directory
    • Volunteers Portal
    • Vulnerable Extensions List
  • Developer Resources
    • Developer Network
    • Security Centre
    • Issue Tracker
    • GitHub
    • API Documentation
    • Joomla! Framework

Joomla! Extensions Directory™

Download
Launch
  • Home
  • Browse Extensions
    • Top Rated
    • Most Reviewed
    • New
    • Recently Updated
    • Compatible with J4
    • Compatible with J5
    • Compatible with J5 (with b/c plugin)
  • Search
  • Community
    • Meet the JED Team
    • Blog
    • JED Newsletter
    • Terms of Service
    • Help Joomla!
  • Support
    • Knowledgebase
    • Sponsor Joomla!
  • Vulnerable Extensions
    • About
    • Vulnerable Extensions
    • Resolved Extensions
    • Abandoned Extensions
    • Submit a Report
    • Submit an Update
    • Submit AbandonWare
    • JSON Feed
  • Log in
  • Register
  • Home
  • Vulnerable Extensions
  • Vulnerable Extensions

Vulnerable Extensions

This category lists vulnerable extensions for which no patch is known to  exists. You are recommended to uninstall any listed here from your site. Patched extensions are moved to the Resolved category.

Filters
List of articles in category Vulnerable Extensions
Title Published Date
Saxum Astro, 4.0.14, SQL Injection 26 February 2018
En Masse, all versions, SQL Injection 15 January 2018
JB Visa,1.0,SQL Injection 06 January 2018
Big File Uploader by Prismanet,1.0.2, Insecure File Upload 06 January 2018
JEXTN Question And Answer ,3.1.0,SQL Injection 20 December 2017
JEXTN Video Gallery 3.0.5 - SQL Injection, 3.0.5 ,SQL Injection 20 December 2017
JBuildozer,1.4.1,SQL Injection 20 December 2017
HDW Player,4.0.0, RCE 24 October 2017
Google Maps by Reumer, 3.5, Malicious update 20 October 2017
Bargain Product VM3, 1.0, SQL Injection 04 October 2017

Page 4 of 24

  • 1
  • 2
  • 3
  • 4
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
VEL Search

Vulnerable Extensions
  • JEVents, 3.6.87, SQL Injection
  • osTicky2, , Other
  • EasyShop, 1.4.1, XSS (Cross Site Scripting)
  • LivingWord, , XSS (Cross Site Scripting)
  • Plugin Creative Gallery , , SQL Injection
  • Proforms Basic via sort_order parameter, , SQL Injection
  • EXTPLORER, 2.1.15, XSS (Cross Site Scripting)
  • LM-CUSTOM-ADMIN, , Other
  • admirror gallery, , XSS (Cross Site Scripting)
  • Proforms Basic Joomla Module, , Other
Resolved Extensions
  • Convert Forms, 4.4.10, XSS (Cross Site Scripting)
  • JS Jobs, 1.4.2, SQL Injection
  • Regularlabs Sourcer, pre version 12.00, Other/RFI
  • HikaShop, 5.1.1, XSS (Cross Site Scripting)
  • Advanced custom fields, 2.7.7, SQL Injection
  • Phoca Gallery, 5.0.0, XSS (Cross Site Scripting)
  • HikaShop Starter 4.7.5 [2308101603], HikaShop Starter 4.7.5 [2308101603], XSS (Cross Site Scripting)
  • LazyDbBackup, 3.9.0, Other
  • Virtual Classroom, , SQL Injection
  • bagallery , , Other

  • Joomla! on Twitter
  • Joomla! on Facebook
  • Joomla! on YouTube
  • Joomla! on LinkedIn
  • Joomla! on Pinterest
  • Joomla! on Instagram
  • Joomla! on GitHub
  • Home
  • About
  • Community
  • Forum
  • Extensions
  • Services
  • Docs
  • Developer
  • Shop
  • Accessibility Statement
  • Privacy Policy
  • Cookie Policy
  • Sponsor Joomla! with $5
  • Help Translate
  • Report an Issue
  • Log in

© 2005 - 2025 Open Source Matters, Inc. All Rights Reserved.

Rochen
Joomla! Hosting by Rochen
× We have detected that you are using an ad blocker. The Joomla! Project relies on revenue from these advertisements so please consider disabling the ad blocker for this domain.