CVE-2018-25337
Joomla JoomOCShop 1.0 Cross-Site Request Forgery
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
Joomla JoomOCShop 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions on behalf of authenticated users. Attackers can craft malicious HTML forms targeting account endpoints like /joomoc2/?route=account/edit and to modify user information or reset passwords without user consent.
| CWE | CWE-352 |
| Vendor | joomlaextensions |
| Product | joomla! extension joomocshop |
| Published | May 17, 2026 |
| Last Updated | May 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for joomlaextensions joomla! extension joomocshop
Be the first to know when new medium vulnerabilities affecting joomlaextensions joomla! extension joomocshop are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Affected Versions
Joomlaextensions / Joomla! extension JoomOCShop
1.0
References
exploit-db.com: https://www.exploit-db.com/exploits/44789 joomlaextensions.co.in: https://www.joomlaextensions.co.in/ extensions.joomla.org: https://extensions.joomla.org/extensions/extension/e-commerce/e-commerce-integrations/joomocshop/ vulncheck.com: https://www.vulncheck.com/advisories/joomla-joomocshop-cross-site-request-forgery
Credits
L0RD or [email protected]