Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Joomla Framework Vulnerabilities Exposed

Critical Joomla Framework Vulnerabilities Exposed

Posted on February 16, 2026 By CWS

Websites utilizing the Novarain/Tassos Framework are exposed to severe security vulnerabilities, allowing unauthorized file access, deletion, and SQL injection attacks. These issues are critical as they could lead to remote code execution and complete administrative control over unpatched systems. It is vital for users to promptly apply the vendor’s updates to address these security flaws.

Details of the Vulnerability

The vulnerabilities were identified during a source-code analysis of the Novarain/Tassos Framework plugin (plg_system_nrframework), revealing inadequately secured AJAX handler processes. This weakness enables attackers to execute PHP classes within the Joomla site structure, turning internal functionalities into accessible pathways for attacks.

Specific classes within the framework are found to mishandle CSV loading, allowing for arbitrary file reading by the web server user. Another class that deals with file deletion is vulnerable to path manipulation, while a third class involved in dynamic field population is susceptible to SQL injection, permitting unauthorized database access.

Impact on Joomla Extensions

Several widely used Joomla extensions are affected, including Convert Forms, EngageBox, Google Structured Data, Advanced Custom Fields, and Smile Pack. These extensions incorporate the vulnerable framework, thus posing indirect risks to numerous sites.

The affected versions range from v4.10.14 to v6.0.37 for the Novarain/Tassos Framework and various versions for the mentioned extensions. As the attack vector exploits unauthenticated AJAX requests, it is crucial to implement security measures such as restricting access and enforcing additional authentication protocols.

Mitigation and Recommendations

The vendor has released updated builds for the affected framework and extensions, which are accessible through official channels and Joomla’s update mechanisms. Administrators must update all Tassos components immediately or disable the vulnerable plugin and related extensions on exposed sites until the patches are applied.

As an additional security measure, operators should limit or filter com_ajax traffic at the server or WAF level and scrutinize logs for any suspicious task=include requests, CSV-related AJAX activities, or unexplained file deletions.

These vulnerabilities were uncovered by security researcher p1r0x in collaboration with SSD Secure Disclosure. Immediate action is required to safeguard websites from potential exploitation.

Stay informed about the latest cybersecurity developments by following us on Google News, LinkedIn, and X. For further insights or to share your stories, feel free to contact us.

Cyber Security News Tags:Cybersecurity, file read, Joomla, Patching, security flaws, SQL injection, Tassos Framework, Vulnerabilities, web development, website security

Post navigation

Previous Post: Microsoft Alerts to ClickFix Technique Exploiting DNS Queries
Next Post: Chrome Zero-Day CVE-2026-2441 Actively Exploited

Related Posts

Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Cyber Security News
Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users Cyber Security News
Critical Chrome Update Fixes High-Severity Vulnerabilities Critical Chrome Update Fixes High-Severity Vulnerabilities Cyber Security News
Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools Cyber Security News
An Open-Source Tool to See Through Encrypted Traffic in Linux systems An Open-Source Tool to See Through Encrypted Traffic in Linux systems Cyber Security News
Windows SMB Client Vulnerability Enables Attacker to Own Active Directory Windows SMB Client Vulnerability Enables Attacker to Own Active Directory Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security
  • Infostealer Targets OpenClaw AI, Exposes Security Flaws
  • AI Assistants Vulnerable to Hidden Memory Manipulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security
  • Infostealer Targets OpenClaw AI, Exposes Security Flaws
  • AI Assistants Vulnerable to Hidden Memory Manipulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News