JoomlArt


In January 2018, the Joomla template website JoomlArt inadvertently exposed more than 22k unique customer records in a Jira ticket. The exposed data was from iJoomla and JomSocial, both services that JoomlArt acquired the previous year. The data included usernames, email addresses, purchases and passwords stored as MD5 hashes. When contacted, JoomlArt advised they were aware of the incident and had previously notified impacted parties.

Domain Entries Date Breached Hashing Privacy acknowledged?
https://joomlart.com 22,477 2018-01-30 MD5 Not rated No

Information leaked

Email addresses, Names, Passwords, Payment histories, Usernames


Notice any errors/mistakes in this breach entry? Please contact us and we will fix it ASAP. We strive to be the best and most accurate, so your contribution(s) will be greatly appreciated.