{"id":"CVE-2018-8045","details":"In Joomla! 3.5.0 through 3.8.5, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the User Notes list view.","modified":"2026-04-02T01:25:16.498945Z","published":"2018-03-15T01:29:03.777Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103402"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040540"},{"type":"ADVISORY","url":"https://developer.joomla.org/security-centre/723-20180301-core-sqli-vulnerability.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/joomla/joomla-cms","events":[{"introduced":"74cccf0179148478b64d76588f16b306697639cd"},{"last_affected":"cabc7099b183f324d8cf561998194f9653d11779"}],"database_specific":{"versions":[{"introduced":"3.5.0"},{"last_affected":"3.8.5"}]}}],"versions":["3.5.0","3.5.1","3.5.1-rc","3.5.1-rc2","3.6.0","3.6.0-alpha","3.6.0-beta1","3.6.0-beta2","3.6.0-rc","3.6.0-rc2","3.6.1","3.6.1-rc1","3.6.1-rc2","3.6.2","3.6.3","3.6.3-rc1","3.6.3-rc2","3.6.3-rc3","3.6.4","3.6.5","3.7.0","3.7.0-alpha1","3.7.0-alpha2","3.7.0-beta1","3.7.0-beta2","3.7.0-beta3","3.7.0-beta4","3.7.0-rc1","3.7.0-rc2","3.7.0-rc3","3.7.0-rc4","3.7.1","3.7.1-rc1","3.7.1-rc2","3.7.2","3.7.3","3.7.3-beta1","3.7.3-rc1","3.7.3-rc2","3.7.4","3.7.4-beta1","3.7.4-rc1","3.7.5","3.8.0","3.8.0-beta1","3.8.0-beta2","3.8.0-beta3","3.8.0-beta4","3.8.0-rc1","3.8.1","3.8.1-rc","3.8.2","3.8.2-rc","3.8.3","3.8.3-rc","3.8.4","3.8.4-rc","3.8.4-rc2","3.8.5","3.8.5-rc","4.0.0-alpha1","4.0.0-alpha2","4.0.0-alpha3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-8045.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}