• Joomla!®
    • Joomla! Home
    • Support Joomla!
    • Contribute
    • The Joomla! Shop
    • Sponsorship
  • About
    • About Joomla!
    • Core Features
    • The Project
    • Leadership
    • Open Source Matters
  • Download & Extend
    • Joomla! Downloads
    • Extensions Directory
    • Language Packages
    • Showcase Directory
    • Certification Program
  • News
    • Announcements
    • Blogs
    • Magazine
    • Joomla! Connect
    • Mailing Lists
  • Community
    • Community Portal
    • Joomla! Events
    • Trademark & Licensing
    • User Groups
    • Volunteers Portal
  • Support
    • Forum
    • Documentation
    • Issue Tracker
    • Resources Directory
    • Joomla! Training
  • Developers
    • Developer Network
    • Documentation
    • Bug Squad
    • Security Centre
    • API Documentation
    • JoomlaCode
    • Joomla! Framework

Joomla! Vulnerable Extensions List

Download
Demo
  • Home
  • Live VEL
  • Vulnerability Reporting
  • Resolved
  • Articles
  • Extension Update Form
  • Ask Team VEL
  • J! core security
PHP Mailer Vulnerability - Morals or Money - Joomla Quickstart packages are a danger? - The Vulnerable Extensions List team is looking for new members. - Users registering without a registration form being published - What Does A Security Release Notice Look Like? - The Perils of the Default Settings - Responsible disclosure - VEL API /JSON released

PHP Mailer Vulnerability

The Joomla Project recently released a security advisory regarding the PHP Mailer library. Please read the announcement for further details. Some extensions also include their own versions of vulnerable library, and developers of the relevant extensions are urged to release updates as soon as possible.

The VEL will be maintaining a list of extensions affected by the issue. Users of the affected extensions are strongly advised to update. To be clear, inclusion on the list simply means that the extension includes the vulnerable library, not that an exploit exists, you should contact the developer if you have any questions.

The Joomla! ® Vulnerable Extensions List

Please check with the extension publisher in case of any questions over the security of their product.

How to use this site

All known vulnerable extensions are the listed in the LIVE VEL section

This list is compiled from found information and may not be an up to date accurate list

  • We do NOT promise to test or validate these reports.
  • We do NOT guarantee the quality or effectiveness of any updates reported to us or listed here.
  • We do not list BETA products, or extensions for J1.0.x or J1,5,x.

How to report a suspected Vulnerable Extension.


Select the Vulnerability Reporting Link

 

 

 

Developers - How to get yourself RESOLVED on the VEL

Please solve the issues and:

 

To have your extension marked as resolved, please follow these steps:

 

  1. Contact the VEL team* with a notice of resolution, the latest version number and a link to the security release statement on your website. (Please read this article for further information on making a security release notice).
  2. Create a JED listing owner ticket to the JED with a notice and ask that your listing be republished. Include the full details of your new version number and security notice page

JVEL contact details  and the JED support link is in your notice of "unpublication"

  • If not JED listed.

Inform us with a notice of resolution, the latest version number and a link to the security release statement on your website.

 * a developer must use the update form for notice of resolution


Subscribe to Joomla! Security - Vulnerable Extensions by Email

Subscribe to Joomla! Security - Recently Resolved Vulnerable Extensions by Email  

  • Joomla! on Twitter
  • Joomla! on Facebook
  • Joomla! on Google+
  • Joomla! on YouTube
  • Joomla! on LinkedIn
  • Joomla! on Pinterest
  • Joomla! on GitHub
  • Home
  • About
  • Community
  • Forum
  • Extensions
  • Resources
  • Docs
  • Developer
  • Shop
  • Accessibility Statement
  • Privacy Policy
  • Help Translate
  • Report an Issue
  • Log in

© 2005 - 2017 Open Source Matters, Inc. All Rights Reserved.

Rochen
Joomla! Hosting by Rochen
× We have detected that you are using an ad blocker. The Joomla! Project relies on revenue from these advertisements so please consider disabling the ad blocker for this domain.