CVE-2008-7091
Pligg Cms < 9.9.0 - SQL Injection
Title source: ruleDescription
Multiple SQL injection vulnerabilities in Pligg 9.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by GulfTech Security · perlwebappsphp
https://www.exploit-db.com/exploits/6172
exploitdb
WRITEUP
VERIFIED
by GulfTech Security · textwebappsphp
https://www.exploit-db.com/exploits/6173
References (15)
Scores
EPSS
0.0391
EPSS Percentile
88.3%
Details
CWE
CWE-89
Status
published
Products (3)
pligg/pligg_cms
9.5
pligg/pligg_cms
9.9.0 beta
pligg/pligg_cms
< 9.9.0
Published
Aug 26, 2009
Tracked Since
Feb 18, 2026