Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21627: CWE-284 Improper Access Control in tassos.gr Novarain/Tassos Framework (plg_system_nrframework)

0
Critical
VulnerabilityCVE-2026-21627cvecve-2026-21627cwe-284
Published: Fri Feb 20 2026 (02/20/2026, 14:22:14 UTC)
Source: CVE Database V5
Vendor/Project: tassos.gr
Product: Novarain/Tassos Framework (plg_system_nrframework)

Description

CVE-2026-21627 is a critical improper access control vulnerability in the Novarain/Tassos Framework plugin (plg_system_nrframework) for Joomla, affecting versions 4. 10. 14 through 6. 0. 37. The flaw arises from insufficient restriction on certain AJAX requests processed via Joomla's com_ajax entry point, allowing unauthorized invocation of internal framework functionality. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 4. 0 score is 9. 5, reflecting high impact on confidentiality, integrity, and availability.

AI-Powered Analysis

AILast updated: 02/20/2026, 14:43:54 UTC

Technical Analysis

CVE-2026-21627 is an improper access control vulnerability classified under CWE-284, found in the Novarain/Tassos Framework plugin (plg_system_nrframework) for Joomla CMS. The vulnerability stems from how the plugin handles specific AJAX requests routed through Joomla's com_ajax entry point. Under certain conditions, the plugin fails to enforce proper access restrictions, allowing unauthenticated remote attackers to invoke internal framework functions that should be protected. This can lead to unauthorized actions that compromise the confidentiality, integrity, and availability of the affected Joomla installations. The affected versions range from 4.10.14 to 6.0.37. The vulnerability has a CVSS 4.0 base score of 9.5, indicating critical severity, with attack vector being network-based, no privileges or user interaction required, and high impact on all security properties. The vulnerability was reserved on January 1, 2026, and published on February 20, 2026. No public exploits have been reported yet, but the nature of the flaw and its critical rating suggest that exploitation could lead to full site compromise or data leakage. The plugin is widely used in Joomla environments, making this a significant threat to websites relying on this framework.

Potential Impact

The impact of CVE-2026-21627 is severe for organizations running Joomla websites with the Novarain/Tassos Framework plugin. Exploitation can allow remote attackers to bypass access controls and invoke sensitive internal functions, potentially leading to unauthorized data access, modification, or deletion. This could result in data breaches, defacement, or complete site takeover. The vulnerability affects confidentiality by exposing sensitive information, integrity by allowing unauthorized changes, and availability by potentially disrupting site operations. Given the plugin's integration with Joomla, a popular CMS used globally, the scope of affected systems is broad. The lack of authentication and user interaction requirements makes exploitation easier and increases the likelihood of automated attacks. Organizations in sectors such as e-commerce, government, education, and media that rely on Joomla for their web presence are particularly at risk, as compromise could lead to reputational damage, financial loss, and regulatory penalties.

Mitigation Recommendations

To mitigate CVE-2026-21627, organizations should immediately update the Novarain/Tassos Framework plugin to a patched version once available. In the absence of an official patch, administrators should restrict access to the com_ajax entry point by implementing web application firewall (WAF) rules that block suspicious or unauthorized AJAX requests targeting the plugin. Additionally, disabling or removing the plg_system_nrframework plugin if it is not essential can reduce the attack surface. Monitoring web server logs for unusual AJAX requests and implementing rate limiting can help detect and prevent exploitation attempts. Joomla administrators should also ensure their overall CMS and plugins are kept up to date and follow the principle of least privilege for user roles. Regular security audits and penetration testing focused on AJAX endpoints can identify similar access control weaknesses proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Joomla
Date Reserved
2026-01-01T04:42:27.960Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69986fcd2c4d84f2609bdee0

Added to database: 2/20/2026, 2:29:33 PM

Last enriched: 2/20/2026, 2:43:54 PM

Last updated: 2/20/2026, 6:17:02 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats