Vulnerability Description
SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the product_option[] parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| J2Store | J2Store | >= 3.3.0, < 3.3.7 |
Related Weaknesses (CWE)
References
- https://andreiconache.me/j2store-plugin-3-3-6-sql-injection/Third Party Advisory
- https://www.exploit-db.com/exploits/46467/ExploitThird Party AdvisoryVDB Entry
- https://www.j2store.org/blog/general/security-update-for-j2store.htmlPatchVendor Advisory
- https://andreiconache.me/j2store-plugin-3-3-6-sql-injection/Third Party Advisory
- https://www.exploit-db.com/exploits/46467/ExploitThird Party AdvisoryVDB Entry
- https://www.j2store.org/blog/general/security-update-for-j2store.htmlPatchVendor Advisory
FAQ
What is CVE-2019-9184?
CVE-2019-9184 is a vulnerability with a CVSS score of 9.8 (CRITICAL). SQL injection vulnerability in the J2Store plugin 3.x before 3.3.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the product_option[] parameter.
How severe is CVE-2019-9184?
CVE-2019-9184 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-9184?
Check the references section above for vendor advisories and patch information. Affected products include: J2Store J2Store.