CVE-2025-54477

5.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to enumerate valid usernames in Joomla's passkey authentication system by observing differences in authentication response times or error messages. It affects Joomla CMS installations using passkey authentication. Attackers can identify which usernames exist in the system, facilitating targeted attacks.

💻 Affected Systems

Products:
  • Joomla CMS
Versions: Joomla 5.1.0 through 5.1.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with passkey authentication enabled. Traditional password authentication is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers build a complete list of valid usernames, enabling targeted brute-force attacks, credential stuffing, or social engineering campaigns against identified users.

🟠

Likely Case

Attackers enumerate some valid usernames and use them for targeted phishing or credential attacks against those specific accounts.

🟢

If Mitigated

With rate limiting and proper logging, only limited username enumeration occurs, detected quickly by security monitoring.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending authentication requests and analyzing response differences. No authentication needed to attempt enumeration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Joomla 5.1.5

Vendor Advisory: https://developer.joomla.org/security-centre/1011-20250902-core-user-enumeration-in-passkey-authentication-method.html

Restart Required: No

Instructions:

1. Backup your Joomla installation and database. 2. Update to Joomla 5.1.5 via the Joomla Update component in the administrator panel. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Passkey Authentication

all

Temporarily disable passkey authentication until patched

Implement Rate Limiting

all

Configure web server or application rate limiting on authentication endpoints

🧯 If You Can't Patch

  • Implement strict rate limiting on authentication endpoints
  • Enable detailed logging of authentication attempts and monitor for enumeration patterns

🔍 How to Verify

Check if Vulnerable:

Check Joomla version in administrator panel or via 'php version.php' in Joomla root directory

Check Version:

php version.php

Verify Fix Applied:

Confirm Joomla version is 5.1.5 or later and test authentication responses show consistent timing/errors

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts for different usernames from same IP
  • Unusual pattern of authentication requests

Network Indicators:

  • High volume of authentication requests to passkey endpoints
  • Requests with sequential or dictionary usernames

SIEM Query:

source="joomla_logs" AND (event_type="authentication_failure" OR event_type="passkey_attempt") | stats count by src_ip, username | where count > 10

🔗 References

📤 Share & Export