CVE-2008-2445

Web Group Communication Center 1.0.3 PreRelease 1 and earlier - Cross-Site Scripting via UserID Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2445. PoCs published by myvx.

AI-analyzed exploit summary This exploit demonstrates XSS and SQL injection vulnerabilities in Web Group Communication Center. The XSS payload bypasses filters via URL encoding, while the SQLi extracts user credentials from the database.

Description

Cross-site scripting (XSS) vulnerability in profile.php in Web Group Communication Center (WGCC) 1.0.3 PreRelease 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the userid parameter in a show action.

Exploits (1)

exploitdb WORKING POC VERIFIED
by myvx · textwebappsphp
https://www.exploit-db.com/exploits/5606

This exploit demonstrates XSS and SQL injection vulnerabilities in Web Group Communication Center. The XSS payload bypasses filters via URL encoding, while the SQLi extracts user credentials from the database.

Classification
Working Poc 90%
Attack Type
Xss | Sqli | Info Leak
Complexity
Trivial
Reliability
Reliable
Target: Web Group Communication Center <= 1.0.3 PreRelease #1
Auth required
Prerequisites: Target application installed · Network access to the application · Valid credentials for SQLi
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42383
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5606
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29188
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30235

Scores

EPSS 0.0404
EPSS Percentile 88.6%

Details

CWE
CWE-79
Status published
Products (1)
wgcc/web_group_communication_center 1.0.3 prerelease1
Published May 27, 2008
Tracked Since Feb 18, 2026