CVE-2008-2093

Community Builder for Joomla! and Mambo - SQL Injection via User Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2093. PoCs published by $hur!k'n.

AI-analyzed exploit summary This is a writeup describing a blind SQL injection vulnerability in the Joomla Profiler component. It provides a DORK, exploit path, and an example payload but does not include executable code.

Description

SQL injection vulnerability in the Profiler (com_comprofiler) component in Community Builder for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the user parameter in a userProfile action to index.php.

Exploits (1)

exploitdb WRITEUP VERIFIED
by $hur!k'n · textwebappsphp
https://www.exploit-db.com/exploits/5491

This is a writeup describing a blind SQL injection vulnerability in the Joomla Profiler component. It provides a DORK, exploit path, and an example payload but does not include executable code.

Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target: Joomla with Profiler component (version unspecified)
No auth needed
Prerequisites: Joomla installation with vulnerable Profiler component
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42008
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5491
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28911

Scores

EPSS 0.0002
EPSS Percentile 6.0%

Details

CWE
CWE-89
Status published
Products (3)
joomla/com_comprofiler
joomlapolis/community_builder
mambo/com_comprofiler
Published May 06, 2008
Tracked Since Feb 18, 2026