Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Joomla Framework Vulnerabilities Exposed

Critical Joomla Framework Vulnerabilities Exposed

Posted on February 16, 2026 By CWS

Websites utilizing the Novarain/Tassos Framework are exposed to severe security vulnerabilities, allowing unauthorized file access, deletion, and SQL injection attacks. These issues are critical as they could lead to remote code execution and complete administrative control over unpatched systems. It is vital for users to promptly apply the vendor’s updates to address these security flaws.

Details of the Vulnerability

The vulnerabilities were identified during a source-code analysis of the Novarain/Tassos Framework plugin (plg_system_nrframework), revealing inadequately secured AJAX handler processes. This weakness enables attackers to execute PHP classes within the Joomla site structure, turning internal functionalities into accessible pathways for attacks.

Specific classes within the framework are found to mishandle CSV loading, allowing for arbitrary file reading by the web server user. Another class that deals with file deletion is vulnerable to path manipulation, while a third class involved in dynamic field population is susceptible to SQL injection, permitting unauthorized database access.

Impact on Joomla Extensions

Several widely used Joomla extensions are affected, including Convert Forms, EngageBox, Google Structured Data, Advanced Custom Fields, and Smile Pack. These extensions incorporate the vulnerable framework, thus posing indirect risks to numerous sites.

The affected versions range from v4.10.14 to v6.0.37 for the Novarain/Tassos Framework and various versions for the mentioned extensions. As the attack vector exploits unauthenticated AJAX requests, it is crucial to implement security measures such as restricting access and enforcing additional authentication protocols.

Mitigation and Recommendations

The vendor has released updated builds for the affected framework and extensions, which are accessible through official channels and Joomla’s update mechanisms. Administrators must update all Tassos components immediately or disable the vulnerable plugin and related extensions on exposed sites until the patches are applied.

As an additional security measure, operators should limit or filter com_ajax traffic at the server or WAF level and scrutinize logs for any suspicious task=include requests, CSV-related AJAX activities, or unexplained file deletions.

These vulnerabilities were uncovered by security researcher p1r0x in collaboration with SSD Secure Disclosure. Immediate action is required to safeguard websites from potential exploitation.

Stay informed about the latest cybersecurity developments by following us on Google News, LinkedIn, and X. For further insights or to share your stories, feel free to contact us.

Cyber Security News Tags:Cybersecurity, file read, Joomla, Patching, security flaws, SQL injection, Tassos Framework, Vulnerabilities, web development, website security

Post navigation

Previous Post: Microsoft Alerts to ClickFix Technique Exploiting DNS Queries
Next Post: Chrome Zero-Day CVE-2026-2441 Actively Exploited

Related Posts

800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks 800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks Cyber Security News
Securing Remote Endpoints in Distributed Enterprise Systems Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Cyber Security News
APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials Cyber Security News
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Cyber Security News
Top 50 Best Penetration Testing Companies Top 50 Best Penetration Testing Companies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Airleader Vulnerability Poses Remote Code Execution Risk
  • Palo Alto Networks Finalizes $25B CyberArk Acquisition
  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News