<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
    <channel>
        <title>XOOPS Web Application System</title>
        <link>https://xoops.org/</link>
        <description>Powered by You!</description>
        <lastBuildDate>Mon, 27 Apr 2026 20:28:46 +0000</lastBuildDate>
        <docs>https://backend.userland.com/rss/</docs>
        <generator>XOOPS</generator>
        <category>Security</category>
        <managingEditor>webmaster at xoops dot org</managingEditor>
        <webMaster>webmaster at xoops dot org</webMaster>
        <language>en</language>
                    <image>
                <title>XOOPS Web Application System</title>
                <url>https://xoops.org/images/logo.gif</url>
                <link>https://xoops.org/</link>
                <width>144</width>
                <height>48</height>
            </image>
                            <item>
                <title>Security Patch for XOOPS 2.5.6</title>
                <link>https://xoops.org/modules/news/article.php?storyid=6545</link>
                <description>As always, security is on top of priority list of XOOPS! &lt;br&gt;&lt;br&gt;Current users of &lt;strong&gt;XOOPS 2.5.6&lt;/strong&gt; are encouraged to download and apply a Security Patch. &lt;br&gt;&lt;br&gt;&lt;strong&gt;Download: &lt;a href=&quot;http://sourceforge.net/projects/xoops/files/XOOPS%20Core%20Patches/xoops_2.5.6_SecurityPatch_htdocs.zip/download&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;SourceForge File Repository&lt;/a&gt;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;This security patch fixes some potential XSS issues discovered by Mehdi Dadkhah and fixed by Richard Griffith.&lt;br&gt;&lt;br&gt;While 2.5.6 Websites that have currently installed Protector are safe from this XSS vulnerability, we &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;strong&gt;recommend strongly&lt;/strong&gt;&lt;/span&gt; to &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;strong&gt;apply this patch to ALL XOOPS 2.5.6 Websites&lt;/strong&gt;&lt;/span&gt;. &lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;color: #FF0000;&quot;&gt;&lt;strong&gt;It is not enough to stress that you should ALWAYS have Protector installed!!!&lt;/strong&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;strong&gt;How to Apply the Patch:&lt;/strong&gt;&lt;br&gt;--------------------------&lt;br&gt;&lt;span style=&quot;color: #FF0000;&quot;&gt;&lt;strong&gt;You will need as minimum PHP 5.3.7&lt;/strong&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;Just copy ALL the files from /htdocs folder in this Zip file to your XOOPS Website. &lt;br&gt;No other action is needed.&lt;br&gt;&lt;br&gt;&lt;br&gt;==============================================&lt;br&gt;&lt;strong&gt;For users of XOOPS Versions older than 2.5.6&lt;/strong&gt;&lt;br&gt;==============================================&lt;br&gt;&lt;br&gt;Please update AS SOON AS POSSIBLE to XOOPS 2.5.6. As always, the current versions are always the most stable and safest, i.e. older versions might be open to vulnerabilities that has been already fixed in the current version. &lt;br&gt;&lt;br&gt;As of today, all XOOPS 2.5.6 versions available for download have been all patched. &lt;br&gt;&lt;br&gt;Wishing everybody Happy and Safe Xoopsing! &lt;br&gt;&lt;br&gt;&lt;strong&gt;XOOPS Core Team&lt;br&gt;2013-09-24&lt;/strong&gt;</description>
                <pubDate>Tue, 24 Sep 2013 19:40:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=6545</guid>
            </item>
                    <item>
                <title>Security Patch for XOOPS 2.5.5</title>
                <link>https://xoops.org/modules/news/article.php?storyid=6430</link>
                <description>Current users of XOOPS 2.5.5 are encouraged to download and apply a &lt;a href=&quot;http://sourceforge.net/projects/xoops/files/XOOPS%20Core%20Patches/xoops_2.5.5_SecurityPatch_htdocs.zip/download&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;&lt;strong&gt;Security Patch&lt;/strong&gt;&lt;/a&gt;. &lt;br&gt;&lt;br&gt;This patch is included in the upcoming &lt;a href=&quot;https://xoops.org/modules/news/article.php?storyid=6429&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;&lt;strong&gt;XOOPS 2.5.6&lt;/strong&gt;&lt;/a&gt;, which should be released in the next couple of weeks, after the testing of the Beta version is done. &lt;br&gt;&lt;br&gt;&lt;strong&gt;Download: &lt;/strong&gt;&lt;a href=&quot;http://sourceforge.net/projects/xoops/files/XOOPS%20Core%20Patches/xoops_2.5.5_SecurityPatch_htdocs.zip/download&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;SourceForge File Repository&lt;/a&gt;</description>
                <pubDate>Thu, 24 Jan 2013 01:09:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=6430</guid>
            </item>
                    <item>
                <title>Security Patch for XOOPS 2.3.3</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4961</link>
                <description>As discussed previously in forums, there are potential vulnerabilities identified in:&lt;br&gt;&lt;br&gt;a) &lt;a href=&quot;https://xoops.org/modules/newbb/viewtopic.php?topic_id=69057&amp;forum=2&amp;post_id=315019#forumpost315019&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;PM &lt;/a&gt; &lt;br&gt;b) &lt;a href=&quot;https://xoops.org/modules/newbb/viewtopic.php?topic_id=68771&amp;forum=2&amp;post_id=312866#forumpost312866&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;Protector &lt;/a&gt;&lt;br&gt;&lt;br&gt;modules.&lt;br&gt;&lt;br&gt;While (a) is addressed by having Protector installed, and (b) is addressed by having &quot;register_globals&quot; disabled and having XOOPS_TRUST_PATH outside of the Document Root, we&apos;ve addressed the issues in XOOPS 2.4. &lt;br&gt;&lt;br&gt;However, since we don&apos;t know when exactly we&apos;ll release XOOPS 2.4, we&apos;re releasing this Security Patch for XOOPS 2.3.3 users.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Download:&lt;/strong&gt; &lt;a href=&quot;http://sourceforge.net/projects/xoops/files/XOOPS%20Core%20Patches/xoops_2.3.3_SecurityPatch_htdocs.zip/download&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;SourceForge XOOPS&lt;/a&gt;. &lt;br&gt;&lt;br&gt;&lt;strong&gt;Installation:&lt;/strong&gt; See the ReadMe.txt file&lt;br&gt;&lt;br&gt;You are highly encouraged to implement the patch to your existing XOOPS 2.3.3 system.&lt;br&gt;&lt;br&gt;Special thanks to Trabis, who addressed these issues.</description>
                <pubDate>Thu, 20 Aug 2009 13:10:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4961</guid>
            </item>
                    <item>
                <title>Vulnerability in Protector if placed in DocumentRoot</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4601</link>
                <description>We&apos;ve been made aware of a &lt;a href=&quot;http://www.securityfocus.com/bid/33176&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;vulnerability of the Protector, if placed in the DocumentRoot&lt;/a&gt; &lt;br&gt;&lt;br&gt;&lt;span style=&quot;color: #FF0000;&quot;&gt;This is for all versions of XOOPS, if the XOOPS_TRUST_PATH (or xoops_lib) directory that contains the Protector, is placed in the DocumentRoot&lt;/span&gt;&lt;br&gt;&lt;br&gt;As we&apos;ve always communicated to you (e.g. in this article &lt;a href=&quot;https://xoops.org/modules/news/article.php?storyid=4431&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;A Guide to Make your XOOPS Installation even more secure&lt;/a&gt;), the best solution is to place your &lt;em&gt;&lt;strong&gt;xoops_lib&lt;/strong&gt;&lt;/em&gt; folder outside of webroot path. You should also change the name of &lt;em&gt;&lt;strong&gt;xoops_lib&lt;/strong&gt;&lt;/em&gt; to something different, and modify the mainfile.php accordingly.&lt;br&gt;&lt;br&gt;If you are not allowed to do so, add .htaccess to protect your Protector module:&lt;br&gt;&lt;br&gt;&lt;div class=&quot;xoopsCode&quot;&gt;&lt;code&gt;&lt;span style=&quot;color: #000000&quot;&gt; &lt;span style=&quot;color: #0000BB&quot;&gt;orderÂ deny&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;,&lt;/span&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;allowÂ  &lt;br /&gt;Â denyÂ fromÂ all&lt;/span&gt; &lt;/span&gt; &lt;/code&gt;&lt;/div&gt;&lt;br&gt;The .htaccess should be placed in /xoops_lib or whatever the name of your XOOPS_TRUST_PATH is.&lt;br&gt;&lt;br&gt;If .htaccess is not allowed or enabled on your server, turn off &lt;em&gt;global_register&lt;/em&gt; on your server.&lt;br&gt;&lt;br&gt;If you are not allowed to do any of the above, then the only solution is to remove Protector module from your server and wait for a complete fix of the module.&lt;br&gt;&lt;br&gt;Of course, the best scenario would be to have clean and safe code. Unfortunately, we&apos;ve missed this security bug, but we&apos;re working on the solution and will release it soon.</description>
                <pubDate>Fri, 09 Jan 2009 09:30:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4601</guid>
            </item>
                    <item>
                <title>XOOPS 2.3.2b  -  Security Release</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4563</link>
                <description>The security is always on top of the list of XOOPS Developers. Therefore the XOOPS Development Team is pleased to announce the release of &lt;strong&gt;&lt;span style=&quot;color: #FF0000;&quot;&gt;XOOPS 2.3.2b&lt;/span&gt;&lt;/strong&gt;, an improved XOOPS 2.3.x release.&lt;br&gt;&lt;br&gt;This release is solely for a couple of critical fixes, including an XSS vulnerability reported by Digital Sercurity Research Group (or DSRG), potential local file inclusion vulnerability reported by DSRG, autologin bug reported by Dylian, a backward bug in data synchronization reported by boy0917 as well as a bug in xoopsmailer reported by ezsky.&lt;br&gt;&lt;br&gt;In the 2.3.2b release we have further improved security fixes with help from DSRG.&lt;br&gt;&lt;br&gt;&lt;span style=&quot;color: #FF0000;&quot;&gt;&lt;strong&gt;All XOOPS 2.3.x users are highly recommended to upgrade to this version ASAP.&lt;/strong&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;color: #CC0000;&quot;&gt;XOOPS 2.0 and 2.2 versions are not vulnerable to the XSS issues addressed here.&lt;/span&gt; However, all 2.0 and 2.2 users who have the Protector module installed are advised to upgrade to the version included in this package for local file inclusion issues.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Download from &lt;a href=&quot;https://sourceforge.net/project/showfiles.php?group_id=41586&amp;package_id=153583&amp;release_id=643845&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;Sourceforge repository&lt;/a&gt;.&lt;/strong&gt;</description>
                <pubDate>Sun, 07 Dec 2008 12:10:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4563</guid>
            </item>
                    <item>
                <title>Protector Security Fix for XOOPS 2.0.x and 2.2.x users</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4544</link>
                <description>Security is always the highest priority for XOOPS, and therefore we are releasing Security Updates as soon as we find a viable solution.&lt;br&gt;&lt;br&gt;This is a temporary quick fix for &lt;strong&gt;&lt;a href=&quot;https://xoops.org/modules/repository/singlefile.php?cid=59&amp;lid=1687&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;Protector&lt;/a&gt;&lt;/strong&gt; module, addressing potential local file inclusion vulnerability reported by DSRG. We hope that GIJOE, the author of Protector, will address this issue in future releases.&lt;br&gt;&lt;br&gt;&lt;strong&gt;It is included in XOOPS 2.3.2a Security release, but if you&apos;re using Protector on XOOPS 2.0.x or 2.2.x, and your XOOPS_TRUST_PATH is located inside the Root, you are advised to upgrade to the version included in this package.&lt;/strong&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;color: #CC0000;&quot;&gt;If your XOOPS_TRUST_PATH is outside of the Root (as you should!), you&apos;re not affected by this vulnerability.&lt;/span&gt; &lt;br&gt;&lt;br&gt;For more information on how to make your XOOPS installation more secure, please &lt;a href=&quot;https://xoops.org/modules/news/article.php?storyid=4431&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;read this article&lt;/a&gt;&lt;br&gt;&lt;br&gt;Download the fix &lt;a href=&quot;http://internap.dl.sourceforge.net/sourceforge/xoops/xoops2-mod_xoopsprotector_v3.20cFix.zip&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;here&lt;/a&gt;&lt;br&gt;&lt;br&gt;XOOPS Development Team&lt;br&gt;November 28th, 2008</description>
                <pubDate>Fri, 28 Nov 2008 14:10:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4544</guid>
            </item>
                    <item>
                <title>XOOPS 2.3.2a  -  Security Release</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4540</link>
                <description>The XOOPS Development Team is pleased to announce the release of &lt;strong&gt;&lt;span style=&quot;color: #FF0000;&quot;&gt;XOOPS 2.3.2a&lt;/span&gt;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;This release is solely for a couple of critical security fixes, including an XSS vulnerability reported by Digital Research Group, potential local file inclusion vulnerability reported by DSG, Autologin bug reported by Dylian and a backward bug in data synchronization reported by boy0917.&lt;br&gt;&lt;br&gt;&lt;span style=&quot;color: #FF0000;&quot;&gt;&lt;strong&gt;All XOOPS 2.3.x users are highly recommended to upgrade to this version ASAP.&lt;/strong&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;color: #CC0000;&quot;&gt;XOOPS 2.0 and 2.2 versions are not vulnerable to the security issues addressed here.&lt;/span&gt; However, all 2.0 and 2.2 users who have the Protector module installed are advised to upgrade to the version included in this package.&lt;br&gt;&lt;br&gt;&lt;strong&gt;Download from &lt;a href=&quot;https://sourceforge.net/project/showfiles.php?group_id=41586&amp;package_id=153583&amp;release_id=643010&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;Sourceforge repository&lt;/a&gt;.&lt;/strong&gt;</description>
                <pubDate>Wed, 26 Nov 2008 06:30:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4540</guid>
            </item>
                    <item>
                <title>A Guide to Make your XOOPS Installation even more secure</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4431</link>
                <description>The reason for writing this guide is &lt;/span&gt;&lt;span lang=&quot;en-US&quot; style=&quot;font-size: small&quot;&gt;&lt;strong&gt;NOT &lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small; &quot;&gt;because XOOPS CMS-system isnât secure enough.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;p&gt;&lt;span lang=&quot;en-US&quot;&gt;Itâs written to give new XOOPS&apos;ers a chance to make, with a few changes, a secure installation even more secure. We believe, that existing users also can use the guide, for securing an already installed XOOP website.&lt;br /&gt;&lt;br /&gt;This guide is written for XOOPS version 2.3.3RC as Core-version.&lt;span style=&quot;font-size: x-small; color: #000080;&quot;&gt;</description>
                <pubDate>Sat, 13 Sep 2008 20:30:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4431</guid>
            </item>
                    <item>
                <title>Security Update for Bluemoon Modules</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4235</link>
                <description>We found XSS valnabirity at our sources.&lt;br&gt;&lt;br&gt;Backpack v0.91 or before&lt;br&gt;Bmsurvey v0.84 or before&lt;br&gt;Newbb_fileup v1.83 or before&lt;br&gt;News_embed v1.44 ( news_fileup ) or before&lt;br&gt;Popnupblog v3.19 or before&lt;br&gt;&lt;br&gt;If you are using those scripts we recommend update immediately.&lt;br&gt;&lt;a href=&quot;http://www.bluemooninc.biz/~xoops2/modules/news/article.php?storyid=33&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;Jump to vendor site&lt;/a&gt;</description>
                <pubDate>Mon, 28 Apr 2008 15:20:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4235</guid>
            </item>
                    <item>
                <title>WF-Sections V2: New Exploits and Security Issues (Users MUST READ this)</title>
                <link>https://xoops.org/modules/news/article.php?storyid=4220</link>
                <description>As always, XOOPS developers are committed to ensuring the highest security of XOOPS code. The message below comes from Catzwolf:&lt;br&gt;&lt;br&gt;Quote:&lt;div class=&quot;xoopsQuote&quot;&gt;&lt;blockquote&gt;&lt;br&gt;If you are still using WF-Sections v1+ and v2+ then I suggest that you read this please.&lt;br&gt;&lt;br&gt;It has come to my attention that there is a few very bad security exploits that some people could use to gain access to your website. I suggest that all users of this module should either:&lt;br&gt;&lt;br&gt;1. Deactivate the module for the time being (recommended) or..&lt;br&gt;2. Renaming XOOPS_ROOT_PATH/modules/wfsections/ratefile.php and print.php.&lt;br&gt;&lt;br&gt;I am now in the process of doing a full audit of all the WF-Sections code and closing these and all possible security risks that may arise in the future.&lt;br&gt;&lt;br&gt;I will keep you all posted on an update.&lt;br&gt;&lt;br&gt;John (AkA Catzwolf)&lt;/blockquote&gt;&lt;/div&gt;&lt;br&gt;To follow the story, please visit &lt;a href=&quot;https://xoops.org/modules/newbb/viewtopic.php?post_id=287148#forumpost287148&quot; rel=&quot;noopener external&quot; title=&quot;&quot;&gt;our discussion Forum&lt;/a&gt;.</description>
                <pubDate>Tue, 15 Apr 2008 08:00:00 +0000</pubDate>
                <guid>https://xoops.org/modules/news/article.php?storyid=4220</guid>
            </item>
            </channel>
</rss>
