Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://stackideas.com/easydiscuss |
|
Fri, 30 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:stackideas:easydiscuss:*:*:*:*:*:joomla\!:*:* | |
| Metrics |
cvssV3_1
|
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joomla
Joomla joomla Joomla joomla! Stackideas Stackideas easydiscuss |
|
| Vendors & Products |
Joomla
Joomla joomla Joomla joomla! Stackideas Stackideas easydiscuss |
Fri, 16 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lack of input filterung leads to a persistent XSS vulnerability in the user avatar text handling of the Easy Discuss component for Joomla. | |
| Title | Extension - stackideas.com - Persistent XSS in EasyDiscuss component 1.0.0-5.0.15 for Joomla | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Joomla
Published:
Updated: 2026-01-16T15:41:11.155Z
Reserved: 2026-01-01T04:42:27.959Z
Link: CVE-2026-21624
Updated: 2026-01-16T15:41:03.493Z
Status : Analyzed
Published: 2026-01-16T15:15:54.873
Modified: 2026-01-30T18:43:24.353
Link: CVE-2026-21624
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:45:38Z