{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T10:02:31.181","vulnerabilities":[{"cve":{"id":"CVE-2025-25226","sourceIdentifier":"security@joomla.org","published":"2025-04-08T17:15:35.453","lastModified":"2025-06-04T20:50:08.840","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used."},{"lang":"es","value":"La gestión incorrecta de identificadores provoca una vulnerabilidad de inyección SQL en el método quoteNameStr del paquete de base de datos. Nota: El método afectado es un método protegido. No se utiliza en los paquetes originales ni en la rama 2.x ni en la 3.x, por lo que la vulnerabilidad en cuestión no puede explotarse al usar la clase de base de datos original. Sin embargo, las clases que extienden la clase afectada podrían verse afectadas si se usa el método vulnerable."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@joomla.org","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"2.2.0","matchCriteriaId":"C69B50FF-AD2E-4F47-BBB9-D6FAA51D0872"},{"vulnerable":true,"criteria":"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.4.0","matchCriteriaId":"D89B0522-E39C-4031-994C-27E6C6AB69AA"}]}]}],"references":[{"url":"https://developer.joomla.org/security-centre/963-20250401-framework-sql-injection-vulnerability-in-quotenamestr-method-of-database-package.html","source":"security@joomla.org","tags":["Vendor Advisory"]}]}}]}