{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T11:14:08.281","vulnerabilities":[{"cve":{"id":"CVE-2025-27754","sourceIdentifier":"security@joomla.org","published":"2025-06-05T14:15:31.683","lastModified":"2025-06-16T17:28:53.470","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was discovered. The vulnerability allows authenticated users to inject malicious JavaScript into the plugin's resource. The injected payload is stored by the application and later executed when other users view the affected content."},{"lang":"es","value":"Se descubrió una vulnerabilidad XSS almacenado en el componente RSBlog! 1.11.6 - 1.14.4 para Joomla. Esta vulnerabilidad permite a usuarios autenticados inyectar JavaScript malicioso en el recurso del complemento. La aplicación almacena el payload inyectado y lo ejecuta posteriormente cuando otros usuarios visualizan el contenido afectado."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":3.7}]},"weaknesses":[{"source":"security@joomla.org","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rsjoomla:rsform\\!blog:*:*:*:*:*:joomla\\!:*:*","versionStartIncluding":"1.11.6","versionEndIncluding":"1.14.4","matchCriteriaId":"CCFB0DFE-ACBA-42D3-9A44-19D6B57E415E"}]}]}],"references":[{"url":"https://rsjoomla.com/","source":"security@joomla.org","tags":["Product"]}]}}]}