VYPR
Medium severityNVD Advisory· Published Jul 18, 2025· Updated Apr 15, 2026

CVE-2025-50126

CVE-2025-50126

Description

A stored XSS vulnerability in the RSBlog! component 1.11.6-1.14.5 Joomla was discovered. The issue allows remote authenticated users to inject arbitrary web script or HTML via the jform[tags_text] parameter.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in RSBlog! 1.11.6–1.14.5 allows authenticated attackers to inject arbitrary script via the jform[tags_text] parameter.

Root

Cause

CVE-2025-50126 is a stored cross-site scripting (XSS) vulnerability found in the RSBlog! component for Joomla, affecting versions 1.11.6 through 1.14.5. The flaw exists in the handling of the jform[tags_text] parameter, which is not properly sanitized before being stored and later rendered. This allows an authenticated user to input arbitrary web script or HTML that will be executed in the context of other users' browsers when the stored data is retrieved.[1]

Exploitation

An attacker must be a remote authenticated user of the Joomla site with access to the RSBlog! component. The attack is carried out by submitting a crafted payload in the jform[tags_text] field, which is likely used for tagging blog entries. No special privileges beyond standard user authentication are required, making it accessible to any registered user.[1]

Impact

Successful exploitation results in the execution of arbitrary JavaScript in the browsers of other users who view the affected blog content. This could enable actions such as session hijacking, defacement, or redirection to malicious sites. The impact is limited to the browser context of viewers, but the stored nature of the XSS increases the reach and potential harm.[1]

Mitigation

The vendor, RSJoomla!, has addressed this issue in a later version of the component. As of the advisory date, the latest version listed is 1.14.11 (11 May 2026), which is outside the vulnerable range. Users are strongly advised to upgrade to the latest available version or apply patches provided by the vendor. No workaround is mentioned in the official description.[1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.