Description
Joomla! CMS 2.5.x before 2.5.19 and 3.x before 3.2.3 allows remote attackers to authenticate and bypass intended restrictions via vectors involving GMail authentication.
Remediation
References
Related Vulnerabilities
WordPress Plugin Users Ultra SQL Injection (1.4.35)
WordPress Plugin Open Graph for Facebook, Google+ and Twitter Card Tags Cross-Site Scripting (2.2.4)
WordPress Plugin CYSTEME Finder, the admin files explorer Cross-Site Request Forgery (1.4)
Liferay DXP Incorrect Default Permissions Vulnerability (CVE-2022-42128)
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2012-6103)