VYPR
Medium severity4.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2018-25337

CVE-2018-25337

Description

Joomla JoomOCShop 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions on behalf of authenticated users. Attackers can craft malicious HTML forms targeting account endpoints like /joomoc2/?route=account/edit and to modify user information or reset passwords without user consent.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

JoomOCShop 1.0 for Joomla has a CSRF vulnerability allowing attackers to modify user accounts or reset passwords via crafted forms.

Vulnerability

The JoomOCShop extension version 1.0 for Joomla is vulnerable to Cross-Site Request Forgery (CSRF) [1][2]. The vulnerability exists in account management endpoints such as /joomoc2/?route=account/edit for updating user profile details and /jcart/account/password.html for changing passwords. No CSRF tokens are used to validate requests, allowing attackers to perform actions on behalf of authenticated users without their consent [1].

Exploitation

An attacker must craft a malicious HTML page containing hidden form fields that target the vulnerable endpoints. The forms are automatically submitted using JavaScript when the victim loads the page [1]. The victim must be an authenticated user of the JoomOCShop site. The attacker can host the page on any server and trick the victim into visiting it, for example via a link in an email or a malicious advertisement [2].

Impact

Successful exploitation allows an attacker to modify the victim's account information, including first name, last name, email, telephone, and fax number, or to reset the password to a value known to the attacker [1]. This can lead to account takeover, unauthorized access to the victim's account, and potential further compromise of the Joomla site if the attacker gains elevated privileges [2].

Mitigation

As of the latest available references, no official patch or fixed version of JoomOCShop has been released to address this vulnerability [1][2]. Users are advised to implement CSRF protection by adding tokens to forms or to disable the extension until a security update is available. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.