CVE-2008-7040

Yellow Swordfish Simple Forum - SQL Injection via u Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-7040. PoCs published by S@BUN.

AI-analyzed exploit summary This exploit demonstrates an SQL injection vulnerability in Simple Forum, allowing an attacker to extract user credentials from the wp_users table via a crafted URL.

Description

SQL injection vulnerability in ahah/sf-profile.php in the Yellow Swordfish Simple Forum module for Wordpress allows remote attackers to execute arbitrary SQL commands via the u parameter. NOTE: this issue was disclosed by an unreliable researcher, so the details might be incorrect.

Exploits (1)

exploitdb WORKING POC VERIFIED
by S@BUN · textwebappsphp
https://www.exploit-db.com/exploits/31227

This exploit demonstrates an SQL injection vulnerability in Simple Forum, allowing an attacker to extract user credentials from the wp_users table via a crafted URL.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Simple Forum (WordPress plugin)
No auth needed
Prerequisites: Target must have Simple Forum plugin installed · Database must be accessible via the vulnerable endpoint
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Exploit mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488279
Exploit vdb-entry x_refsource_osvdb
http://osvdb.org/52210
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41578
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/27854

Scores

EPSS 0.0010
EPSS Percentile 28.0%

Details

CWE
CWE-89
Status published
Products (1)
yellowswordfish/simple_forum
Published Aug 24, 2009
Tracked Since Feb 18, 2026