CVE-2026-23898
Published: 01 April 2026
Summary
CVE-2026-23898 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Joomla Joomla\!. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked at the 0.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-9 (Information Input Restrictions).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the lack of input validation in the autoupdate server mechanism that enables arbitrary file deletion via external control of file paths.
Enforces restrictions on information inputs to the com_joomlaupdate component, preventing malicious file paths from being processed.
Limits privileges required for autoupdate operations, reducing the attack surface for high-privilege (PR:H) users exploiting the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file deletion directly enables indicator removal via file deletion and data destruction on the affected system.
NVD Description
Lack of input validation leads to an arbitrary file deletion vulnerability in the autoupdate server mechanism.
Deeper analysisAI
CVE-2026-23898 is an arbitrary file deletion vulnerability stemming from a lack of input validation in the autoupdate server mechanism of Joomla CMS, specifically within the com_joomlaupdate core component. Published on 2026-04-01, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-73 (External Control of File Name or Path).
The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) by authenticated users possessing high privileges (PR:H), without requiring user interaction (UI:N) and with an unchanged scope (S:U). Attackers can achieve arbitrary file deletion, resulting in high impacts to confidentiality (C:H), integrity (I:H), and availability (A:H).
The official Joomla security advisory at https://developer.joomla.org/security-centre/1031-20260305-core-arbitrary-file-deletion-in-com-joomlaupdate.html details mitigation steps for this issue.
Details
- CWE(s)