CVE-2008-0281

ID-Commerce < 2.0 - SQL Injection via idFamille Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-0281. PoCs published by consultant.securite.

AI-analyzed exploit summary The provided text describes an SQL injection vulnerability in ID-Commerce, with example URLs demonstrating the exploit. It lacks executable code but provides clear proof-of-concept payloads.

Description

SQL injection vulnerability in liste.php in ID-Commerce 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the idFamille parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by consultant.securite · textwebappsphp
https://www.exploit-db.com/exploits/31009

The provided text describes an SQL injection vulnerability in ID-Commerce, with example URLs demonstrating the exploit. It lacks executable code but provides clear proof-of-concept payloads.

Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: ID-Commerce (version unspecified)
No auth needed
Prerequisites: Network access to the vulnerable application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39594
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27220

Scores

EPSS 0.0037
EPSS Percentile 59.1%

Details

CWE
CWE-89
Status published
Products (1)
id-commerce/id-commerce < 2.0
Published Jan 15, 2008
Tracked Since Feb 18, 2026