CVE-2008-2422

Webslider - SQL Injection

Title source: rule
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2422. PoCs published by fahn zichler.

AI-analyzed exploit summary This exploit demonstrates SQL injection in Web Slider 0.6 via the 'slide' parameter, allowing attackers to extract sensitive data such as user credentials, database information, and system files like /etc/passwd.

Description

SQL injection vulnerability in index.php in Web Slider 0.6 allows remote attackers to execute arbitrary SQL commands via the slide parameter in a slides action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by fahn zichler · textwebappsphp
https://www.exploit-db.com/exploits/31810

This exploit demonstrates SQL injection in Web Slider 0.6 via the 'slide' parameter, allowing attackers to extract sensitive data such as user credentials, database information, and system files like /etc/passwd.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Web Slider 0.6
No auth needed
Prerequisites: Access to the vulnerable web application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (2)

Core 2
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29296
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42555

Scores

EPSS 0.0025
EPSS Percentile 48.8%

Details

CWE
CWE-89
Status published
Products (1)
webslider/webslider 0.6
Published May 23, 2008
Tracked Since Feb 18, 2026