CVE-2007-4719

212cafeBoard 6.30 Beta - SQL Injection via read.php id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-4719. PoCs published by Lopez Bran Digrap.

AI-analyzed exploit summary The provided text describes an SQL injection vulnerability in 212cafe Webboard 6.30, where unsanitized user input in the 'id' parameter of read.php can be exploited to manipulate SQL queries. No actual exploit code is included, only a description and example URL.

Description

SQL injection vulnerability in read.php in 212cafeBoard 6.30 Beta allows remote attackers to execute arbitrary SQL commands via the id parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Lopez Bran Digrap · textwebappsphp
https://www.exploit-db.com/exploits/30560

The provided text describes an SQL injection vulnerability in 212cafe Webboard 6.30, where unsanitized user input in the 'id' parameter of read.php can be exploited to manipulate SQL queries. No actual exploit code is included, only a description and example URL.

Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target: 212cafe Webboard 6.30
No auth needed
Prerequisites: Access to the vulnerable web application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/478496/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36403
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3099
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/25526
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38334

Scores

EPSS 0.0060
EPSS Percentile 69.8%

Details

CWE
CWE-89
Status published
Products (1)
212cafe/212cafeboard 6.30_beta
Published Sep 05, 2007
Tracked Since Feb 18, 2026