CVE-2008-2792

erocms < 1.4 - SQL Injection via Site Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2792. PoCs published by Mr.SQL.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in eroCMS versions 1.0 to 1.4. It leverages a vulnerable 'site' parameter in index.php to extract user credentials (password and email) from the 'members' table.

Description

SQL injection vulnerability in index.php in eroCMS 1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the site parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/5846

This exploit demonstrates a SQL injection vulnerability in eroCMS versions 1.0 to 1.4. It leverages a vulnerable 'site' parameter in index.php to extract user credentials (password and email) from the 'members' table.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: eroCMS 1.0 - 1.4
No auth needed
Prerequisites: Access to the target URL with the vulnerable parameter
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29781
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5846
Exploit, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30723
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43157

Scores

EPSS 0.0049
EPSS Percentile 65.5%

Details

CWE
CWE-89
Status published
Products (1)
erocms/erocms < 1.4
Published Jun 20, 2008
Tracked Since Feb 18, 2026