Description
Joomla! extension EkRishta 2.10 contains persistent cross-site scripting and SQL injection vulnerabilities that allow attackers to inject malicious code through profile fields and POST parameters. Attackers can inject script payloads in profile information fields like Address that execute when users visit the profile, or submit SQL injection payloads via the phone_no parameter to the user_setting endpoint to manipulate database queries.
Published: 2026-05-17
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The EkRishta extension 2.10 contains persistent cross‑site scripting and SQL injection flaws that allow an attacker to inject malicious script into profile information fields such as Address and to execute arbitrary SQL statements via the phone_no POST parameter. The affected inputs are stored in the database and reflected when other users view the profile, giving the attacker code execution and data manipulation capabilities. The core weakness is identified as CWE‑89, reflecting improper handling of user input in SQL and web output contexts.

Affected Systems

Any Joomla site that has installed EkRishta version 2.10 is affected. The vulnerability is present in the profile management and user_setting components of the extension. No other product versions are listed as affected in the current data.

Risk and Exploitability

Rated with a CVSS score of 8.8, the weakness represents a high‑severity threat. Because the EPSS score is not available, the likelihood of exploitation is unknown, but the vulnerability is exploitable through the public web interface of the extension. The vulnerability is not listed in the CISA KEV catalog, indicating there is no known large‑scale exploitation campaign at the time of this analysis. The likely attack vector is an authenticated or unauthenticated user submitting the malicious payload via the extension’s form controls, causing stored script execution and SQL manipulation.

Generated by OpenCVE AI on May 17, 2026 at 13:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Uninstall or disable the EkRishta extension until a patched version is released by the vendor.
  • If the extension is required, configure Joomla to escape all profile output and enforce stringent server‑side validation on the phone_no POST parameter to prevent injection.
  • Add web application firewall rules to block request payloads containing script tags and SQL injection patterns targeting the EkRishta endpoints.

Generated by OpenCVE AI on May 17, 2026 at 13:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Joomlaextensions
Joomlaextensions joomla! Extension Ekrishta
Vendors & Products Joomlaextensions
Joomlaextensions joomla! Extension Ekrishta

Sun, 17 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description Joomla! extension EkRishta 2.10 contains persistent cross-site scripting and SQL injection vulnerabilities that allow attackers to inject malicious code through profile fields and POST parameters. Attackers can inject script payloads in profile information fields like Address that execute when users visit the profile, or submit SQL injection payloads via the phone_no parameter to the user_setting endpoint to manipulate database queries.
Title Joomla! EkRishta 2.10 Persistent XSS and SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Joomlaextensions Joomla! Extension Ekrishta
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-17T12:11:35.396Z

Reserved: 2026-05-17T11:44:19.182Z

Link: CVE-2018-25330

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:44.573

Modified: 2026-05-17T13:16:44.573

Link: CVE-2018-25330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T17:00:01Z

Weaknesses