Joomla Component jomres 9.11.2 Cross-Site Request Forgery
Description
Joomla Component jomres 9.11.2 contains a cross-site request forgery vulnerability that allows attackers to modify user account information by tricking authenticated users into visiting malicious pages. Attackers can craft HTML forms targeting the account/index endpoint with hidden fields to change passwords, email addresses, and profile details without user consent.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Joomla! Component jomres 9.11.2 is vulnerable to CSRF, allowing attackers to modify user accounts by tricking authenticated users into submitting a crafted form.
Vulnerability
Joomla! Component jomres version 9.11.2 contains a cross-site request forgery (CSRF) vulnerability in the account/index endpoint. The application does not implement anti-CSRF tokens or other request validation mechanisms, allowing an attacker to craft HTML forms that, when submitted by an authenticated victim, perform unauthorized modifications to the victim's account details [1], [2].
Exploitation
An attacker must host a malicious HTML page containing a form that automatically submits POST requests to the index.php?cmd=account/index endpoint of the vulnerable jomres installation. The form includes hidden fields for password, email, name, company, address, and other profile details. The attacker can lure an authenticated jomres user (e.g., via social engineering) into visiting the malicious page; no additional authentication or interaction beyond page visit is required, as the form submits automatically via JavaScript [1].
Impact
Upon successful exploitation, the attacker gains the ability to change the victim's password, email address, and other profile settings without the victim's knowledge or consent. This can lead to account takeover, privilege escalation (if the account has administrative roles), and further compromise of the Joomla instance [1], [2].
Mitigation
The vendor has not released a patched version as of the available references. Users should apply input validation and add CSRF tokens to all state-changing requests, especially the account/index endpoint. Until a fix is available, consider using browser extensions or Web Application Firewall (WAF) rules to block requests from external origins to sensitive endpoints. Alternatively, upgrade to a more recent version of jomres if a security fix has been released [1], [2].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.exploit-db.com/exploits/44901mitreexploit
- www.vulncheck.com/advisories/joomla-component-jomres-cross-site-request-forgerymitrethird-party-advisory
- extensions.joomla.org/extension/jomres/mitreproduct
- www.jomres.netmitreproduct
News mentions
0No linked articles in our index yet.