Description
Joomla! 2.5.x before 2.5.25, 3.x before 3.2.4, and 3.3.x before 3.3.4 allows remote attackers to authenticate and bypass intended access restrictions via vectors involving LDAP authentication.
Remediation
References
Related Vulnerabilities
WordPress Plugin Revive Old Post-Auto Post to Social Media 'cat' Parameter SQL Injection (3.2.5)
Magento Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-8155)
WordPress Plugin WP Content Copy Protection & No Right Click Cross-Site Request Forgery (3.1.5)
OpenSSL Missing Encryption of Sensitive Data Vulnerability (CVE-2019-1547)
WordPress Plugin Elementor Pro Arbitrary File Upload (2.9.3)