CVE-2018-25330
Description
Joomla! extension EkRishta 2.10 contains persistent cross-site scripting and SQL injection vulnerabilities that allow attackers to inject malicious code through profile fields and POST parameters. Attackers can inject script payloads in profile information fields like Address that execute when users visit the profile, or submit SQL injection payloads via the phone_no parameter to the user_setting endpoint to manipulate database queries.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Joomla! extension EkRishta 2.10 contains persistent XSS via profile fields and SQL injection via the phone_no parameter, allowing code execution and database manipulation.
Vulnerability
Details
The Joomla! extension EkRishta version 2.10 suffers from two distinct vulnerabilities: persistent cross-site scripting (XSS) and SQL injection. The root cause is insufficient sanitization of user-supplied input. Profile fields such as Address do not properly escape HTML, allowing attackers to inject arbitrary script payloads. Additionally, the phone_no parameter in the user_setting endpoint is not sanitized against SQL metacharacters, enabling injection of malicious SQL commands [1][2].
Exploitation
For the XSS vulnerability, an attacker can register a profile and insert a payload like "> into the Address field. This payload executes in the browser of any user who views the attacker's profile [1]. The SQL injection is performed by sending a POST request to /index.php/profile/user_setting with a crafted phone_no value. The request includes a hidden task parameter set to save and a save button. No authentication is explicitly required in the exploit description, but the user_setting page likely requires a valid session [1][2].
Impact
Successful XSS allows an attacker to execute arbitrary JavaScript in the context of a victim's session, potentially leading to session hijacking, defacement, or phishing. The SQL injection can manipulate database queries, enabling data extraction, modification, or deletion. Given the CVSS v3 score of 8.2 (High), the impact on confidentiality and integrity is significant [2].
Mitigation
As of the latest advisories, no official patch has been released for EkRishta 2.10. The extension is likely end-of-life or unsupported. Users are strongly advised to disable or remove the extension from their Joomla! installations to eliminate the risk [2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
2- Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout SkimmingThe Hacker News · May 16, 2026
- ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New StoriesThe Hacker News · Apr 23, 2026