Description
Joomla! Core is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Joomla! Core versions ranging from 2.5.0 and up to and including 3.9.1 are vulnerable.
Remediation
Update to Joomla! Core version 3.9.2 or latest
References
https://www.exploit-db.com/exploits/46200
https://packetstormsecurity.com/files/151234/Joomla-3.9.1-Cross-Site-Scripting.html
https://developer.joomla.org/security-centre/760-20190101-core-stored-xss-in-mod-banners
https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html
Related Vulnerabilities
WordPress Plugin Contact Form by BestWebSoft Cross-Site Scripting (3.34)
WordPress Plugin Post Recommendations for WordPress 'api.php' Remote File Include (1.1.2)
ReviveAdserver Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-9456)
MySQL CVE-2013-1506 Vulnerability (CVE-2013-1506)
WordPress Plugin Store Locator for WordPress with Google Maps-LotsOfLocales SQL Injection (3.11)