<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Joomla — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/joomla/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 23:17:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/joomla/feed.xml" rel="self" type="application/rss+xml"/><item><title>Smart Slider 3 Pro Compromised Update Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-slider-rce/</link><pubDate>Thu, 09 Apr 2026 23:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-slider-rce/</guid><description>Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system allowing unauthenticated remote code execution and system takeover.</description><content:encoded><![CDATA[<p>Smart Slider 3 Pro version 3.5.1.35, a popular WordPress and Joomla plugin, is vulnerable to remote code execution due to a compromised update system. This vulnerability, tracked as CVE-2026-34424, allows unauthenticated attackers to inject a multi-stage remote access toolkit. The attackers leverage this toolkit to execute arbitrary code and commands, effectively taking control of the affected web server. This vulnerability poses a significant threat to websites using the vulnerable plugin, potentially leading to data theft, website defacement, or use of the server for malicious purposes. Defenders should prioritize patching or removing the affected plugin version immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the Smart Slider 3 Pro update server.</li>
<li>A malicious update is pushed to vulnerable Smart Slider 3 Pro installations (version 3.5.1.35).</li>
<li>The plugin downloads and installs the malicious update, injecting the multi-stage remote access toolkit.</li>
<li>The attacker triggers pre-authentication remote shell execution by sending crafted HTTP headers to the web server.</li>
<li>An authenticated backdoor is established, allowing the attacker to execute arbitrary PHP code or OS commands.</li>
<li>The attacker creates hidden administrator accounts within WordPress or Joomla to maintain persistent access.</li>
<li>Credentials and access keys are exfiltrated from the compromised system.</li>
<li>Persistence is maintained through multiple injection points, including modifications to must-use plugins and core files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34424 leads to complete compromise of the affected web server. Attackers can gain unauthorized access to sensitive data, including user credentials, database information, and proprietary code. Websites can be defaced, injected with malware, or used as part of a botnet. The vulnerability affects all users of Smart Slider 3 Pro version 3.5.1.35, regardless of the underlying operating system. Given the widespread use of WordPress and Joomla, a large number of websites are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove or update Smart Slider 3 Pro to a patched version newer than 3.5.1.35 to remediate CVE-2026-34424.</li>
<li>Monitor web server logs for suspicious HTTP requests with unusual headers indicative of attempted pre-authentication shell execution as described in the Attack Chain.</li>
<li>Implement the provided Sigma rules to detect suspicious process creation and file modifications related to the injected toolkit.</li>
<li>Audit user accounts for unauthorized administrator accounts as the attacker creates hidden accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>joomla</category><category>remote-code-execution</category><category>plugin</category></item><item><title>Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)</title><link>https://feed.craftedsignal.io/briefs/2026-03-joomla-rce/</link><pubDate>Mon, 23 Mar 2026 12:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-joomla-rce/</guid><description>An unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.</description><content:encoded>&lt;p>CVE-2026-32968 describes a critical remote code execution (RCE) vulnerability affecting the com_mb24sysapi module in Joomla. The vulnerability stems from improper neutralization of special elements within OS commands, allowing an unauthenticated remote attacker to inject arbitrary commands. Successful exploitation of this vulnerability can lead to complete compromise of the affected system. This vulnerability is identified as a variant of CVE-2020-10383, suggesting a similar underlying flaw…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32968</category><category>joomla</category><category>rce</category><category>command-injection</category></item></channel></rss>