CVE-2023-54361
Description
Joomla iProperty Real Estate 4.1.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the filter_keyword parameter. Attackers can craft URLs containing JavaScript payloads in the filter_keyword GET parameter of the all-properties-with-map endpoint to execute arbitrary code in victim browsers and steal session tokens or credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Joomla iProperty Real Estate 4.1.1 has a reflected XSS in filter_keyword parameter, allowing attackers to execute arbitrary JavaScript in victims' browsers.
Vulnerability
Description
The Joomla iProperty Real Estate component version 4.1.1 is vulnerable to a reflected cross-site scripting (XSS) flaw. The filter_keyword GET parameter in the all-properties-with-map endpoint fails to properly sanitize user input, enabling attackers to inject arbitrary JavaScript code [1][2]. This is a classic XSS vulnerability (CWE-79) that can be exploited without authentication.
Exploitation
An attacker can craft a malicious URL containing a JavaScript payload in the filter_keyword parameter, such as pihil"onmouseover="alert(1)"style="position:absolute;width:100%;height:100%;top:0;left:0;"f63m4. The victim must click or interact with the crafted link, typically delivered via email or instant message [1]. The attack does not require authentication, but relies on user interaction [2].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can be used to steal session tokens, login credentials, or perform other malicious actions on behalf of the victim, leading to account takeover or data theft [1][2].
Mitigation
As of the publication date, there is no patch available for this vulnerability. The vendor, The Thinkery LLC, has not released a fix. Users should consider disabling the component or implementing a web application firewall (WAF) rule to filter malicious input until a patch is issued [2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.