CVE-2008-0451

PacerCMS 0.6 - Authenticated SQL Injection via id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-0451. PoCs published by RawSecurity.org.

AI-analyzed exploit summary The provided text describes SQL injection vulnerabilities in PacerCMS versions prior to 0.6.1, where user-supplied input is not properly sanitized. It includes a sample exploit URL but lacks actual exploit code.

Description

Multiple SQL injection vulnerabilities in PacerCMS 0.6 allow remote authenticated users to execute arbitrary SQL commands via the id parameter to (1) siteadmin/article-edit.php; and unspecified parameters to (2) submitted-edit.php, (3) page-edit.php, (4) section-edit.php, (5) staff-edit.php, and (6) staff-access.php in siteadmin/.

Exploits (1)

exploitdb WRITEUP VERIFIED
by RawSecurity.org · textwebappsphp
https://www.exploit-db.com/exploits/31048

The provided text describes SQL injection vulnerabilities in PacerCMS versions prior to 0.6.1, where user-supplied input is not properly sanitized. It includes a sample exploit URL but lacks actual exploit code.

Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target: PacerCMS < 0.6.1
Auth required
Prerequisites: staff member access
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39833
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3574
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/486796/100/0/threaded
Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27397

Scores

EPSS 0.0115
EPSS Percentile 78.7%

Details

CWE
CWE-89
Status published
Products (1)
pacercms/pacercms 0.6
Published Jan 25, 2008
Tracked Since Feb 18, 2026