EXPLOITDB-EDB-35839
EXPLOITDB text VERIFIED WORKING POC
Exploit for EIP-2026-108788
- Joomla! Component Minitek FAQ Book 1.3 - 'id' SQL Injection
AI Analysis
This exploit demonstrates an SQL injection vulnerability in Joomla Minitek FAQ Book by injecting a UNION-based query to extract user credentials from the database. The PoC is a direct URL manipulation example targeting unsanitized input in the 'id' parameter.
Attack Type
SQLi
Complexity
trivial
Reliability
reliable
Click anywhere or press Esc to close