Support

Admin Tools

#42803 Concern Over Target URL with Specific Character String

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
5.3.3
PHP version
8.1
Admin Tools version
7.8.6

Latest post by SouthernWeb on Sunday, 15 March 2026 09:37 CDT

SouthernWeb

Hello,

I've gotten a recent avalanche of access attempts. Over 400 in the last few days.

The target URLs contain html such as %22, %29, %2F, etc. Always in long combinations and between words like PROCEDURE, CONCAT, WHERE, SELECT, ANALYSE, UPDATEXML.

example:
(domain)/index.php?id=41%22%2F%2A%2A%2FPROCEDURE%2F%2A%2A%2FANALYSE%28EXTRACTVALUE%286441%2C%2F%2A%2150000CONCAT%2A%2F%280x5c%2C%2527~%2527%2C%28%2F%2A%2150000SELECT%2A%2F%28ELT%286441%3D6441%2C1%29%29%29%2C%2527~%2527%29%29%2C1%29--+-&Itemid=41&option=com_content

The IPs are random, but the attempts come in batches. Several over a short period, a small break, then repeat. They all use the same article ID.

Although there are a few exceptions, the IPs are usually used once. During this pattern, only 3 IPs have been banned.

I tested one of the URLs and it resulted in a 403 error.

The site is in someone's crosshairs, but I don't know if this is an acceptable level of threat or something that needs a heightened awareness.

Thanks!

nicholas
Akeeba Staff
Manager

Not only this is blocked on your site, it's utterly ineffective as well. The id parameter in Joomla's com_content extension is cleaned up and typecast to an integer before being used in a SQL query using a prepared statement, thus having three layers of protection against SQL injection. Similar protection applies for other query parameters.

This has been the case since at least Joomla 1.5 which was published 18 years ago. As you understand, someone using an at least 18-year-old exploit against a modern site is not an attacker, it's a script kiddie. Just like a small dog with a bad attitude they are all bark, no bite; quite loud and annoying but otherwise harmless.

You can of course block them at the .htaccess level with a simple custom rule to be added at the top of the file in the .htaccess Maker:

RewriteCond %{QUERY_STRING} (^|&)id=41"
RewriteRule ^ - [F]

You should note that %22 is the character " but URL-encoded. Since the absolute and utter moron behind these attacks can't even be bothered to change the numeric ID in the payload, and knowing that Joomla will never try to add a double quote in a numeric parameter in the URL, this will block all these requests very early in the request parsing pipeline on Apache's side, long before PHP (let alone Joomla) loads.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

SouthernWeb

Hi Nicholas,

Thanks for the information. I know ZERO about hacking tools and methods. It was the volume of attempts that had me concerned. I'm glad my concern was unnecessary.

I was pleased to hear that this method is ineffective and dates back to the Y2K scare. As a fan of a well-placed insult, I was even more pleased that your evaluation of his method was dripping with them.

I also reached out to my host. Their scans showed (as you would have guessed) no malicious code.

Your influence goes further than you know. Since I opened this ticket 16 hours ago, there have been no more attempts of that type. That's a record by about 15 hours. My only conclusion is that they heard you were on the case and ran away!

Thanks Again!

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!