CVE-2008-2193
ScorpNews 2.0 - Remote Code Execution via example.php site Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-2193. PoCs published by Silver.
AI-analyzed exploit summary This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in Scorp News Version 2. The vulnerability allows an attacker to include arbitrary remote PHP files via the 'site' parameter in example.php.
Description
PHP remote file inclusion vulnerability in example.php in Thomas Gossmann ScorpNews 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the site parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Silver · textwebappsphp
https://www.exploit-db.com/exploits/5539
This exploit demonstrates a Remote File Inclusion (RFI) vulnerability in Scorp News Version 2. The vulnerability allows an attacker to include arbitrary remote PHP files via the 'site' parameter in example.php.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:
Scorp News Version 2
No auth needed
Prerequisites:
Remote PHP file hosting · Network access to the target
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42517
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29041
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5539
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1430/references
Scores
EPSS
0.0356
EPSS Percentile
87.9%
Details
CWE
CWE-94
Status
published
Products (1)
scorpnews/scorpnews
2.0
Published
May 14, 2008
Tracked Since
Feb 18, 2026