Joomla! CMS 2.5.x before 2.5.19 and 3.x before 3.2.3 allows remote attackers to authenticate and bypass intended restrictions via vectors involving GMail authentication.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.