Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Thethinkery
Thethinkery joomla Iproperty Real Estate |
|
| Vendors & Products |
Thethinkery
Thethinkery joomla Iproperty Real Estate |
Thu, 09 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Joomla iProperty Real Estate 4.1.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the filter_keyword parameter. Attackers can craft URLs containing JavaScript payloads in the filter_keyword GET parameter of the all-properties-with-map endpoint to execute arbitrary code in victim browsers and steal session tokens or credentials. | |
| Title | Joomla iProperty Real Estate 4.1.1 Reflected XSS via filter_keyword | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-10T14:06:28.536Z
Reserved: 2026-04-09T20:41:56.551Z
Link: CVE-2023-54361
Updated: 2026-04-10T14:06:24.360Z
Status : Deferred
Published: 2026-04-09T21:16:05.533
Modified: 2026-04-15T15:00:32.790
Link: CVE-2023-54361
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:29:13Z