Arbitrary File Deletion Flaw in Joomla’s Update Mechanism
CVE-2026-23898

8.6HIGH

Key Information:

Vendor

Joomla

Vendor
CVE Published:
1 April 2026

What is CVE-2026-23898?

CVE-2026-23898 is a vulnerability identified in the Joomla content management system, notable for its capability to execute arbitrary file deletions through the autoupdate server mechanism. This flaw arises from a lack of proper input validation, which could allow malicious actors to compromise the integrity of an organization’s files and data. Joomla, widely used for creating and managing websites, facilitates updates that can inadvertently expose critical vulnerabilities like this one. If exploited, this vulnerability could lead to unauthorized loss of essential files, significantly impairing an organization's operations and potentially affecting its reputation.

Potential impact of CVE-2026-23898

  1. Data Loss: The primary risk associated with this vulnerability is the potential for irreversible loss of important files. Attackers could exploit this to delete essential data, leading to significant operational disruptions and data recovery challenges.

  2. System Integrity Compromise: By utilizing this flaw, a malicious party could manipulate the autoupdate process, potentially undermining the overall integrity of the Joomla installations. This can hinder security measures, exposing the system to further attacks and vulnerabilities.

  3. Operational Downtime: Organizations may face downtime as a result of the exploitation of this vulnerability, leading to potential revenue losses and customer dissatisfaction. The inability to maintain website operations can have cascading effects on business functions and client trust.

Affected Version(s)

Joomla! CMS 4.0.0-5.4.3

Joomla! CMS 6.0.0-6.0.3

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Phil Taylor
.