Browse all 3 CVE security advisories affecting mooj.org. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Mooj.org operates as a web-based platform primarily focused on collaborative project management and document sharing. Historically, the organization has faced vulnerabilities across multiple classes, including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation, with three CVEs documented to date. Security assessments indicate that authentication mechanisms and input validation have been recurring areas of concern. While no major public security incidents have been reported, the consistent presence of vulnerabilities in web components suggests ongoing challenges in secure development practices. The platform's open nature and third-party integrations likely contribute to its attack surface, requiring continuous security hardening measures.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-54296 | Extension - mooj.org - Stored XSS vulnerability in ProFiles component 1.0-1.5.0 for Joomla — ProFiles component for JoomlaCWE-79 | 6.1 | - | 2025-07-23 |
| CVE-2023-40655 | Extension - mooj.org - Reflected XSS in Proforms Basic component for Joomla <= 1.6.0 — Proforms Basic component for JoomlaCWE-79 | 6.1AI | MediumAI | 2023-12-14 |
| CVE-2023-34476 | Extension - mooj.org - SQLi in Proforms Basic component for Joomla <= 1.6.0 — Proforms Basic component for JoomlaCWE-89 | 9.8 | - | 2023-08-07 |
This page lists every published CVE security advisory associated with mooj.org. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.