The Joomla! Project and Community is excited and proud to announce the immediate availability of Joomla! CMS 3.2.0 Stable. With literally dozens of new features including: Content version control Many user interface improvements Easy multi-lingual setup for 64
See other templatesSee other templates

Search: - For:

Getting Help

There are lots of places you can get help with Joomla!. In many places in your site...

The Joomla! Project

The Joomla Project consists of all of the people who make and support the Joomla Web Platform...

Using Joomla!

With Joomla you can create anything from a simple personal website to a complex ecommerce or social...

 

If this is your first Joomla! site or your first web site, you have come to the right place. Joomla will help you get your website up and running quickly and easily. Start off using your site by logging in using the administrator account you created when you installed Joomla. Explore the articles and other resources right here on your site data to learn more about how Joomla works.
Joomla! 3 continues development of the Joomla Platform and CMS as a powerful and flexible way to bring your vision of the web to reality. With the new administrator interface and adoption of Twitter Bootstrap, the ability to control its look and the management of extensions is now complete. Working with multiple template styles and overrides for the same views, creating the design you want is easier than it has ever been. Limiting support to PHP 5.3.10 and above makes Joomla lighter and faster than ever.

Joomla! Security News

  1. [20180104] - Core - SQLi vulnerability in Hathor postinstall message

    • Project: Joomla!
    • SubProject: CMS
    • Impact: High
    • Severity: Low
    • Versions: 3.7.0 through 3.8.3
    • Exploit type: SQLi
    • Reported Date: 2017-November-17
    • Fixed Date: 2018-January-30
    • CVE Number: CVE-2018-6376

    Description

    The lack of type casting of a variable in SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message.

    Affected Installs

    Joomla! CMS versions 3.7.0 through 3.8.3

    Solution

    Upgrade to version 3.8.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Karim Ouerghemmi, ripstech.com
  2. [20180103] - Core - XSS vulnerability in Uri class

    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 1.5.0 through 3.8.3
    • Exploit type: XSS
    • Reported Date: 2017-November-17
    • Fixed Date: 2018-January-30
    • CVE Number: CVE-2018-6379

    Description

    Inadequate input filtering in the Uri class (formerly JUri) leads to a XSS vulnerability.

    Affected Installs

    Joomla! CMS versions 1.5.0 through 3.8.3

    Solution

    Upgrade to version 3.8.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Octavian Cinciu
  3. [20180102] - Core - XSS vulnerability in com_fields

    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 3.7.0 through 3.8.3
    • Exploit type: XSS
    • Reported Date: 2018-January-20
    • Fixed Date: 2018-January-30
    • CVE Number: CVE-2018-6377

    Description

    Inadequate input filtering in com_fields leads to a XSS vulnerability in multiple field types, i.e. list, radio and checkbox.

    Affected Installs

    Joomla! CMS versions 3.7.0 through 3.8.3

    Solution

    Upgrade to version 3.8.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Benjamin Trenkle, JSST
  4. [20180101] - Core - XSS vulnerability in module chromes

    • Project: Joomla!
    • SubProject: CMS
    • Impact: Moderate
    • Severity: Low
    • Versions: 3.0.0 through 3.8.3
    • Exploit type: XSS
    • Reported Date: 2018-January-21
    • Fixed Date: 2018-January-30
    • CVE Number: CVE-2018-6380

    Description

    Lack of escaping in the module chromes leads to XSS vulnerabilities in the module system.

    Affected Installs

    Joomla! CMS versions 3.0.0 through 3.8.3

    Solution

    Upgrade to version 3.8.4

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: David Jardin, JSST
  5. [20171103] - Core - Information Disclosure

    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 3.7.0 through 3.8.1
    • Exploit type: Information Disclosure
    • Reported Date: 2017-May-17
    • Fixed Date: 2017-November-07
    • CVE Number: CVE-2017-16633

    Description

    A logic bug in com_fields exposed read-only information about a site's custom fields to unauthorized users.

    Affected Installs

    Joomla! CMS versions 3.7.0 through 3.8.1

    Solution

    Upgrade to version 3.8.2

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Internal JSST audit

Getting Help

There are lots of places you can get help with Joomla!. In many places in your site...

The Joomla! Project

The Joomla Project consists of all of the people who make and support the Joomla Web Platform...

Using Joomla!

With Joomla you can create anything from a simple personal website to a complex ecommerce or social...

  

If this is your first Joomla! site or your first web site, you have come to the right place. Joomla will help you get your website up and running quickly and easily. Start off using your site by logging in using the administrator account you created when you installed Joomla.

If you are an experienced Joomla! user, this Joomla site will seem very familiar but also very different. The biggest change is the new administrator interface and the adoption of responsive design. Hundreds of other improvements have been made. 

Joomla! 3 continues development of the Joomla Platform and CMS as a powerful and flexible way to bring your vision of the web to reality. With the new administrator interface and adoption of Twitter Bootstrap, the ability to control its look and the management of extensions is now complete.

Go to top
national cpr association