The vulnerability was rooted in how the Tassos Framework plugin handled specific AJAX requests through Joomla’s com_ajax entry point. Under certain conditions, internal framework functionality could be invoked without proper restriction.
References
Link Providers
https://tassos.gr cve-icon cve-icon
History

Fri, 20 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description The vulnerability was rooted in how the Tassos Framework plugin handled specific AJAX requests through Joomla’s com_ajax entry point. Under certain conditions, internal framework functionality could be invoked without proper restriction.
Title Extension - tassos.gr - SQL injection and Unauthenticated File Read in Novarain/Tassos Framework v4.10.14 – v6.0.37 for Joomla
Weaknesses CWE-284
References
Metrics cvssV4_0

{'score': 9.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Joomla

Published:

Updated: 2026-02-20T14:22:14.744Z

Reserved: 2026-01-01T04:42:27.960Z

Link: CVE-2026-21627

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-20T15:20:29.467

Modified: 2026-02-20T15:34:10.670

Link: CVE-2026-21627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.