[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-26907":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":42},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":39,"name":40,"published":41,"updated":27},26907,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":27,"risk_description":28,"public_description":29,"public_recommendation":30,"recommendation":27,"references":31,"cvssv3":27,"epss_score":33,"epss_percentile":34,"cve":35,"in_cisa_catalog":37,"date":38,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"Inadequate checks in the Media Manager allowed users with edit privileges to create executable PHP files. Successful exploitation would allow an authenticated attacker to execute arbitrary code on the target system.","Joomla! is prone to a remote code execution (RCE) vulnerability.","Update to version 4.4.12, 5.2.5 or later.",[32],"https://developer.joomla.org/security-centre/961-20250301-core-malicious-file-uploads-via-media-managere-malicious-file-uploads-via-media-manager.html",0.00139,0.34085,[36],"CVE-2025-22213",false,"2025-03-11T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.128107","Joomla! RCE Vulnerability (20250301)","2025-03-19T00:00:00Z",["Island",43],{"key":44,"params":45,"result":47},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":46},"{\"text-color\":\"gray\"}",{"head":48},{}]