Joomla is prone to a vulnerability that allow remote attacker to execute the arbitrary code, as application fails to sanitize user-supplied input. An attacker can leverage this issue to obtain sensitive information, modify data or upload web shell.
Apply associated Trend Micro DPI Rules.