Vulnerability Description
An issue was discovered in Joomla! 2.5.0 through 3.9.22. The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla\! | >= 2.5.0, <= 3.9.22 |
Related Weaknesses (CWE)
References
- https://developer.joomla.org/security-centre/830-20201103-core-path-traversal-inVendor Advisory
- https://developer.joomla.org/security-centre/830-20201103-core-path-traversal-inVendor Advisory
FAQ
What is CVE-2020-35612?
CVE-2020-35612 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Joomla! 2.5.0 through 3.9.22. The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability.
How severe is CVE-2020-35612?
CVE-2020-35612 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-35612?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla\!.