CVE-2007-5973

JPortal Web Portal < 2.3.1 - SQL Injection via Topic Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-5973. PoCs published by Alexsize.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in jPORTAL <= 2.3.1 via the 'topic' parameter in articles.php, allowing unauthorized access to admin credentials. The vulnerable code directly interpolates user input into a SQL query without sanitization.

Description

SQL injection vulnerability in articles.php in JPortal 2.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the topic parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Alexsize · textwebappsphp
https://www.exploit-db.com/exploits/4614

This exploit demonstrates a SQL injection vulnerability in jPORTAL <= 2.3.1 via the 'topic' parameter in articles.php, allowing unauthorized access to admin credentials. The vulnerable code directly interpolates user input into a SQL query without sanitization.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: jPORTAL <= 2.3.1
No auth needed
Prerequisites: Target running jPORTAL <= 2.3.1 · Access to the articles.php endpoint
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38363
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38750
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26395
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/4614

Scores

EPSS 0.0046
EPSS Percentile 64.4%

Details

CWE
CWE-89
Status published
Products (1)
jportal/jportal_web_portal < 2.3.1
Published Nov 15, 2007
Tracked Since Feb 18, 2026