CVE-2026-21630
SQL Injection in Joomla Articles Webservice via Order Clause
Publication date: 2026-04-01
Last updated on: 2026-04-09
Assigner: Joomla! Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| joomla | joomla! | From 3.0.0 (inc) to 5.4.4 (exc) |
| joomla | joomla! | From 6.0.0 (inc) to 6.0.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-21630 is a SQL injection vulnerability in the Joomla! CMS, specifically in the com_content articles webservice endpoint.
The vulnerability occurs because of improperly constructed SQL order clauses, which allow an attacker to inject malicious SQL code.
This affects Joomla! CMS versions 4.0.0 through 5.4.3 and 6.0.0 through 6.0.3.
How can this vulnerability impact me? :
This SQL injection vulnerability can allow an attacker to execute malicious SQL commands on the Joomla! CMS database.
Such an attack could lead to unauthorized data access, data modification, or other harmful database operations.
The severity is classified as high impact, although the probability of exploitation is low.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the SQL injection vulnerability in the Joomla! CMS com_content articles webservice endpoint, users should upgrade their Joomla! installations.
- Upgrade to Joomla! version 5.4.4 or later if you are using versions 4.0.0 through 5.4.3.
- Upgrade to Joomla! version 6.0.4 or later if you are using versions 6.0.0 through 6.0.3.
These upgrades contain the fix for the improperly constructed SQL order clauses that lead to this SQL injection vulnerability.