Description
Joomla JoomOCShop 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions on behalf of authenticated users. Attackers can craft malicious HTML forms targeting account endpoints like /joomoc2/?route=account/edit and to modify user information or reset passwords without user consent.
Published: 2026-05-17
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The JoomOCShop 1.0 extension in Joomla! contains a cross‑site request forgery flaw that permits attackers to perform unauthorized actions on the accounts of users who are already logged in. By crafting malicious HTML forms that target administrative routes such as /joomoc2/?route=account/edit, an attacker can alter account details or reset passwords without the victim’s consent. This vulnerability is a classic CSRF weakness as indicated by CWE‑352, enabling an attacker to exploit an authenticated session to change sensitive data.

Affected Systems

The affected system is the Joomla! extension JoomOCShop, specifically version 1.0. No other vendors or products are listed, and the vulnerability is tied to the account‑editing endpoints exposed by the extension.

Risk and Exploitability

The assigned CVSS score of 5.3 reflects a moderate risk, with no EPSS data available and the vulnerability not listed in CISA’s KEV catalog. The likely attack vector is a user visiting a malicious page that contains a forged form submitted to the vulnerable account endpoint, exploiting the fact that the user’s browser automatically includes their authenticated session cookie. While the vulnerability requires an active session, an attacker who can obtain such a session, whether through phishing or session hijacking, can perform the harmful actions detailed above.

Generated by OpenCVE AI on May 17, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an updated version of JoomOCShop that fixes the CSRF issue and install it immediately.
  • If no patch is available, block or rate‑limit POST requests to /joomoc2/?route=account/edit that lack the correct CSRF token using a web‑application firewall.
  • Require users to confirm critical account changes (e.g., password resets) via a secondary verification step such as an email link or two‑factor authentication.

Generated by OpenCVE AI on May 17, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 17 May 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Joomlaextensions
Joomlaextensions joomocshop
Vendors & Products Joomlaextensions
Joomlaextensions joomocshop

Sun, 17 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description Joomla JoomOCShop 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions on behalf of authenticated users. Attackers can craft malicious HTML forms targeting account endpoints like /joomoc2/?route=account/edit and to modify user information or reset passwords without user consent.
Title Joomla JoomOCShop 1.0 Cross-Site Request Forgery
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Joomlaextensions Joomocshop
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-18T10:44:48.764Z

Reserved: 2026-05-17T11:58:11.660Z

Link: CVE-2018-25337

cve-icon Vulnrichment

Updated: 2026-05-18T10:43:37.398Z

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:45.470

Modified: 2026-05-17T13:16:45.470

Link: CVE-2018-25337

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T16:59:52Z

Weaknesses