CVE-2008-2193

ScorpNews 2.0 - Remote Code Execution via example.php site Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2193. PoCs published by Silver.

AI-analyzed exploit summary This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in Scorp News Version 2. The vulnerability allows an attacker to include arbitrary remote PHP files via the 'site' parameter in example.php.

Description

PHP remote file inclusion vulnerability in example.php in Thomas Gossmann ScorpNews 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the site parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Silver · textwebappsphp
https://www.exploit-db.com/exploits/5539

This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in Scorp News Version 2. The vulnerability allows an attacker to include arbitrary remote PHP files via the 'site' parameter in example.php.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: Scorp News Version 2
No auth needed
Prerequisites: Remote PHP file hosting · Network access to the target
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42517
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29041
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5539
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1430/references

Scores

EPSS 0.0356
EPSS Percentile 87.9%

Details

CWE
CWE-94
Status published
Products (1)
scorpnews/scorpnews 2.0
Published May 14, 2008
Tracked Since Feb 18, 2026