Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://astroidframe.work |
|
Fri, 13 Mar 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Templaza
Templaza astroid Framework |
|
| CPEs | cpe:2.3:a:templaza:astroid_framework:*:*:*:*:*:joomla\!:*:* | |
| Vendors & Products |
Templaza
Templaza astroid Framework |
|
| Metrics |
cvssV3_1
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Astroidframe.work
Astroidframe.work astroid Template Framework |
|
| Vendors & Products |
Astroidframe.work
Astroidframe.work astroid Template Framework |
Thu, 05 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution. | |
| Title | Extension - astroidframe.work - Unauthenticated Remote Code Execution in Astroid Framework 2.0.0 - 3.3.10 for Joomla | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Joomla
Published:
Updated: 2026-03-05T14:30:16.055Z
Reserved: 2026-01-01T04:42:27.960Z
Link: CVE-2026-21628
Updated: 2026-03-05T14:30:00.682Z
Status : Analyzed
Published: 2026-03-05T10:15:57.930
Modified: 2026-03-13T01:33:31.743
Link: CVE-2026-21628
No data.
OpenCVE Enrichment
Updated: 2026-04-17T13:00:11Z