CVE-2008-7178

XOOPS Uploader 1.1 - Path Traversal

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-7178. PoCs published by MEEKAAH.

AI-analyzed exploit summary This exploit demonstrates a Local File Inclusion (LFI) vulnerability in XOOPS Module Uploader 1.1. The vulnerability allows an attacker to read arbitrary files on the server by manipulating the 'filename' parameter in the URL.

Description

Directory traversal vulnerability in Uploader module 1.1 for XOOPS allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a downloadfile action to index.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by MEEKAAH · textwebappsphp
https://www.exploit-db.com/exploits/5756

This exploit demonstrates a Local File Inclusion (LFI) vulnerability in XOOPS Module Uploader 1.1. The vulnerability allows an attacker to read arbitrary files on the server by manipulating the 'filename' parameter in the URL.

Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: XOOPS Module Uploader 1.1
No auth needed
Prerequisites: Access to the vulnerable XOOPS module
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5756
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42925
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29600

Scores

EPSS 0.0172
EPSS Percentile 82.7%

Details

CWE
CWE-22
Status published
Products (1)
xoops/uploader 1.1
Published Sep 08, 2009
Tracked Since Feb 18, 2026