VYPR
Medium severity6.1NVD Advisory· Published Apr 9, 2026· Updated Apr 15, 2026

CVE-2023-54360

CVE-2023-54360

Description

Joomla JLex Review 6.0.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the review_id URL parameter. Attackers can craft malicious links containing JavaScript payloads that execute in victims' browsers when clicked, enabling session hijacking or credential theft.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in JLex Review 6.0.1 via the review_id parameter allows attackers to inject scripts, enabling session hijacking and credential theft.

Vulnerability Overview CVE-2023-54360 describes a reflected cross-site scripting (XSS) vulnerability in the Joomla extension JLex Review version 6.0.1 [1]. The issue originates from improper neutralization of user input within the review_id URL parameter [2]. This allows an attacker to inject arbitrary JavaScript code into the page output.

Exploitation The vulnerability can be triggered by crafting a malicious URL that includes a JavaScript payload in the review_id parameter. An example payload from an exploit proof-of-concept uses an event handler and style attributes to execute code when the victim hovers over the page [3]. No authentication is required, and the attack is performed through social engineering, such as sending the link via email or instant messaging.

Impact If a victim clicks the crafted link, the injected script executes within their browser session. This can lead to session hijacking, credential theft, or other actions performed in the context of the affected web application [2]. The CVSS v3 score is 6.1 (Medium), indicating moderate severity.

Mitigation The vulnerability affects JLex Review version 6.0.1. Users should check for updates from the vendor JLexArt [4] or consider disabling the extension until a patch is applied. The exploit has been publicly disclosed, increasing the risk of active exploitation.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.