<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>EkRishta 2.10 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ekrishta-2.10/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 13:19:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ekrishta-2.10/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2018-25330: Joomla! EkRishta Extension Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2018-25330-ekrishta-vulns/</link><pubDate>Sun, 17 May 2026 13:19:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2018-25330-ekrishta-vulns/</guid><description>Joomla! extension EkRishta 2.10 contains persistent cross-site scripting and SQL injection vulnerabilities, allowing attackers to inject malicious code through profile fields and POST parameters, potentially leading to information disclosure or arbitrary code execution.</description><content:encoded><![CDATA[<p>The Joomla! extension EkRishta 2.10 is vulnerable to both persistent cross-site scripting (XSS) and SQL injection attacks. The vulnerability allows attackers to inject malicious code via profile information fields such as &ldquo;Address&rdquo;, which gets executed when other users view the profile. Additionally, SQL injection is possible via the <code>phone_no</code> POST parameter when interacting with the <code>user_setting</code> endpoint, potentially allowing attackers to manipulate database queries. This combination of vulnerabilities could lead to unauthorized access to sensitive information, modification of data, or even complete compromise of the affected Joomla! installation. The reported CVSS v3.1 base score is 8.2, indicating a high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious payload containing JavaScript or SQL code.</li>
<li>Attacker accesses a user profile and modifies the &ldquo;Address&rdquo; field with the crafted XSS payload.</li>
<li>Attacker sends a crafted POST request to the <code>user_setting</code> endpoint with a SQL injection payload in the <code>phone_no</code> parameter.</li>
<li>The application stores the malicious XSS payload in the database.</li>
<li>A legitimate user views the profile containing the attacker&rsquo;s injected address.</li>
<li>The stored XSS payload is rendered in the user&rsquo;s browser, executing the malicious script.</li>
<li>The SQL injection payload is processed by the application, potentially modifying database content or disclosing sensitive data.</li>
<li>The attacker gains unauthorized access to sensitive information or control over parts of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to severe consequences. The XSS vulnerability allows attackers to execute arbitrary JavaScript code in the context of a user&rsquo;s browser, potentially stealing session cookies, redirecting users to malicious websites, or defacing the website. The SQL injection vulnerability can allow attackers to read, modify, or delete sensitive data in the database, including user credentials and personal information. While the number of affected EkRishta installations is unknown, a successful attack could compromise user privacy, damage the website&rsquo;s reputation, and lead to financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for the EkRishta extension to address CVE-2018-25330, mitigating both the XSS and SQL injection vulnerabilities.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2018-25330 Exploitation Attempt — SQL Injection in phone_no Parameter</code> to detect attempts to exploit the SQL injection vulnerability via the <code>phone_no</code> parameter in web server logs.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2018-25330 Exploitation Attempt — Suspicious Address Field</code> to detect attempts to inject XSS payloads into the Address field via web server logs.</li>
<li>Implement input validation and sanitization measures to prevent XSS attacks by filtering out potentially malicious characters in user-supplied data.</li>
<li>Use parameterized queries or prepared statements to prevent SQL injection vulnerabilities by properly escaping user-supplied data in database queries.</li>
<li>Monitor web server logs for suspicious activity, such as unusual requests or error messages, that may indicate an attempted exploitation of the vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>joomla</category><category>ekrishta</category><category>xss</category><category>sql injection</category><category>web application</category><category>vulnerability</category></item></channel></rss>