CVE-2026-21630
Published: 01 April 2026
Summary
CVE-2026-21630 is a high-severity SQL Injection (CWE-89) vulnerability in Joomla Joomla\!. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 0.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-21630 by identifying, scanning for, and applying the vendor patch that corrects the improper SQL order clause construction in Joomla's articles webservice.
Prevents SQL injection exploitation by implementing input validation mechanisms at the articles webservice endpoint to sanitize or reject malicious order clauses.
Mitigates the vulnerability by restricting order clause inputs to whitelisted safe values, such as predefined column names, blocking injection payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct SQL injection in Joomla public-facing webservice endpoint enables remote exploitation of web application.
NVD Description
Improperly built order clauses lead to a SQL injection vulnerability in the articles webservice endpoint.
Deeper analysisAI
CVE-2026-21630 is a SQL injection vulnerability stemming from improperly built order clauses in the articles webservice endpoint of Joomla's com_content component. This affects Joomla CMS core, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), classified under CWE-89. The issue was published on 2026-04-01.
The vulnerability can be exploited remotely by low-privileged authenticated users with low attack complexity and no user interaction required. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially allowing arbitrary SQL query execution to read, modify, or delete database contents.
Joomla's security advisory (https://developer.joomla.org/security-centre/1028-20260302-core-sql-injection-in-com-content-articles-webservice-endpoint.html) addresses the vulnerability, providing details on the affected endpoint and recommending updates to patched versions for mitigation.
Details
- CWE(s)