CVE-2023-54361
Joomla iProperty Real Estate 4.1.1 Reflected XSS via filter_keyword
CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
11th
Joomla iProperty Real Estate 4.1.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the filter_keyword parameter. Attackers can craft URLs containing JavaScript payloads in the filter_keyword GET parameter of the all-properties-with-map endpoint to execute arbitrary code in victim browsers and steal session tokens or credentials.
| CWE | CWE-79 |
| Vendor | thethinkery |
| Product | joomla iproperty real estate |
| Published | Apr 9, 2026 |
| Last Updated | Apr 10, 2026 |
Stay Ahead of the Next One
Get instant alerts for thethinkery joomla iproperty real estate
Be the first to know when new medium vulnerabilities affecting thethinkery joomla iproperty real estate are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
None
Availability
None
Affected Versions
Thethinkery / Joomla iProperty Real Estate
4.1.1
References
exploit-db.com: https://www.exploit-db.com/exploits/51640 thethinkery.net: http://thethinkery.net extensions.joomla.org: https://extensions.joomla.org/extension/vertical-markets/real-estate/iproperty/ vulncheck.com: https://www.vulncheck.com/advisories/joomla-iproperty-real-estate-reflected-xss-via-filter-keyword
Credits
CraCkEr