Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Home/CyberSecurity News/Joomla Novarain/Tassos Framework SQLi Vulnerabilities Enables
CyberSecurity News

Joomla Novarain/Tassos Framework SQLi Vulnerabilities Enables

Critical security flaws in the Novarain/Tassos Framework leave websites open to unauthenticated file read, file deletion, and SQL injection attacks. On unpatched systems, these vulnerabilities could...

Emy Elsamnoudy
Emy Elsamnoudy
February 16, 2026 2 Min Read
0 0

Critical security flaws in the Novarain/Tassos Framework leave websites open to unauthenticated file read, file deletion, and SQL injection attacks. On unpatched systems, these vulnerabilities could escalate to remote code execution and full administrator takeover. The issues impact multiple popular Tassos extensions, requiring urgent patching through the vendor’s updated releases.

A source‑code review of the shared Novarain/Tassos Framework plugin (plg_system_nrframework) uncovered three core primitives exposed through an AJAX handler that processes the task=include action without proper hardening.

By abusing this entry point, an attacker can invoke PHP classes under the Joomla site root that implement an onAjax method, effectively turning internal helper classes into remotely reachable gadgets.

Within these gadgets, one class mishandles CSV loading, which can be coerced into reading arbitrary files accessible to the webserver user.

While another class exposes a remove action that deletes attacker‑supplied paths without additional validation.

A third class, used for dynamic field population, passes attacker‑controlled parameters into database queries, creating an SQL injection primitive capable of arbitrary table and column reads under the Joomla database account.

Chaining these capabilities allows an external attacker to steal administrator session data from the database, pivot into the backend, and then deploy a malicious extension or modify templates to gain persistent RCE.

Affected components and impact

The vulnerable framework is bundled into several widely deployed Joomla extensions, including Convert Forms, EngageBox, Google Structured Data, Advanced Custom Fields, and Smile Pack, meaning many sites inherit the risk indirectly through these add‑ons.

Component / Extension Affected versions
Novarain/Tassos Framework (plg_system_nrframework) v4.10.14 – v6.0.37
Convert Forms v3.2.12 – v5.1.0
EngageBox v6.0.0 – v7.1.0
Google Structured Data v5.1.7 – v6.1.0
Advanced Custom Fields v2.2.0 – v3.1.0
Smile Pack v1.0.0 – v2.1.0

Impacted version ranges include Novarain/Tassos Framework (plg_system_nrframework) and specific releases of each extension, with exploitation possible as long as the system plugin remains enabled on an internet‑facing site.

Because the attack vector relies solely on unauthenticated AJAX requests, common hardening steps such as restricting access to the admin role and adding additional passwords are necessary.

Adding plugin‑level secrets does not prevent compromise once an attacker can read or delete files and query the database.

In realistic attack chains, adversaries can exploit SQL injection to obtain super admin sessions, log into the backend, and then weaponize file-write paths to execute arbitrary PHP code, leading to a full site takeover.

The vendor has responded by shipping fixed builds of the Tassos Framework and affected extensions, available through the official downloads section and standard Joomla update mechanisms.

The vulnerabilities were discovered by independent security researcher p1r0x in collaboration with SSD Secure Disclosure.

Administrators should immediately update all Tassos components or temporarily turn off the plg_system_nrframework plugin and related extensions on exposed sites until patching is complete.

As a defense‑in‑depth step, operators should restrict or filter com_ajax traffic at the web server or WAF, and review logs for suspicious task=include requests, unusual CSV‑related AJAX activity, or unexplained file deletions that may indicate attempted exploitation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitPatchSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Clickfix Matryoshka Variant Attacks Users with Attacking Deploy

Next Post

Ivanti EPMM RCE Vulnerability Under Active Exploitation

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us