Description
SQL injection vulnerability in mod/PM/reply.php in Open Tibia Server CMS (OTSCMS) 2.1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter to priv.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by GregStar · textwebappsphp
https://www.exploit-db.com/exploits/3283
References (5)
Core 5
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/3283
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32322
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24116
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22450
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/33169
Scores
EPSS
0.0112
EPSS Percentile
78.3%
Details
Status
published
Products (4)
open_tibia_server_cms/open_tibia_server_cms
2.0
open_tibia_server_cms/open_tibia_server_cms
2.1.3
open_tibia_server_cms/open_tibia_server_cms
2.1.4
open_tibia_server_cms/open_tibia_server_cms
2.1.5
Published
Feb 08, 2007
Tracked Since
Feb 18, 2026