CVE-2008-2222

EQdkp 1.3.2f - SQL Injection via user_id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2222. PoCs published by vortfu.

AI-analyzed exploit summary This PHP script demonstrates an authentication bypass vulnerability in EQDKP 1.3.2f by crafting a malicious serialized cookie with a SQL injection payload. The payload manipulates the user_id field to bypass authentication and elevate privileges.

Description

SQL injection vulnerability in login.php in EQdkp 1.3.2f allows remote attackers to bypass EQdkp user authentication via the user_id parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by vortfu · textwebappsphp
https://www.exploit-db.com/exploits/5603

This PHP script demonstrates an authentication bypass vulnerability in EQDKP 1.3.2f by crafting a malicious serialized cookie with a SQL injection payload. The payload manipulates the user_id field to bypass authentication and elevate privileges.

Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: EQDKP 1.3.2f
No auth needed
Prerequisites: Access to the target application's cookie mechanism
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30206
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42381
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5603
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29184

Scores

EPSS 0.0040
EPSS Percentile 61.0%

Details

CWE
CWE-89
Status published
Products (1)
eqdkp/eqdkp 1.3.2f
Published May 14, 2008
Tracked Since Feb 18, 2026