The vulnerability was rooted in how the Tassos Framework plugin handled specific AJAX requests through Joomla’s com_ajax entry point. Under certain conditions, internal framework functionality could be invoked without proper restriction.Creditsp1r0x / ssd-disclosure.comReferenceshttps://tassos.gr