CVE-2008-2853

Easy Webstore 1.2 - SQL Injection via cat_path Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2853. PoCs published by Mr.SQL.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in Easy Webstore v1.2 via the 'cat_path' parameter in index.php. The PoC uses a UNION-based SQLi to extract database information such as user, version, and database name.

Description

SQL injection vulnerability in index.php in Easy Webstore 1.2 allows remote attackers to execute arbitrary SQL commands via the cat_path parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/5855

This exploit demonstrates a SQL injection vulnerability in Easy Webstore v1.2 via the 'cat_path' parameter in index.php. The PoC uses a UNION-based SQLi to extract database information such as user, version, and database name.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Easy Webstore v1.2
No auth needed
Prerequisites: Target application must be running Easy Webstore v1.2 · The 'cat_path' parameter must be accessible and vulnerable
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43194
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29806
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30726
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5855

Scores

EPSS 0.0049
EPSS Percentile 65.5%

Details

CWE
CWE-89
Status published
Products (1)
easy_webstore/easy_webstore 1.2
Published Jun 25, 2008
Tracked Since Feb 18, 2026