### [CVE-2018-11326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11326) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in Joomla! Core before 3.8.8. Inadequate input filtering leads to a multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a XSS attack. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Hax0rG1rl/my_cve_and_bounty_poc - https://github.com/happyhacking-k/happyhacking-k - https://github.com/happyhacking-k/my_cve_and_bounty_poc