Impact
The Easy Discuss component for Joomla verifies uploads only by file extension, ignoring the MIME type reported by the browser or derived from file content, a flaw that constitutes a CWE-434 vulnerability (Unrestricted upload of binaries). This oversight allows an attacker to supply a file whose name ends with a permitted extension—such as .jpg or .png—while embedding executable code or scripts inside the payload. If the server later serves or executes the file, the attacker could gain local code execution, upload backdoors, or compromise the entire Joomla installation (inferred).
Affected Systems
Stackideas EasyDiscuss extension for Joomla versions 1.0.0 through 5.0.15 is affected. Administrators using any edition of these releases should verify the build number against the vulnerable range.
Risk and Exploitability
The vulnerability carries a CVSS base score of 4.8, indicating moderate severity, while the EPSS score is below 1 %, suggesting a low probability of exploitation in the wild. The issue is not listed in the CISA KEV catalog, further implying limited public exploitation. It is inferred that attackers would typically need to interact with the public upload interface or compromise an authenticated user to upload the malicious file, after which they could exploit the server’s ability to serve or execute the file.
OpenCVE Enrichment