CVE-2009-2926

PHP Competition System BETA 0.84 - SQL Injection via Day or Pageno Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-2926. PoCs published by Mr.SQL.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in PHP Competition System BETA <= V0.84 via the 'show_matchs.php' and 'persons.php' parameters. It allows an attacker to extract user credentials (name, password, email) from the database.

Description

Multiple SQL injection vulnerabilities in PHP Competition System BETA 0.84 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) day parameter to show_matchs.php and (2) pageno parameter to persons.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/9438

This exploit demonstrates a SQL injection vulnerability in PHP Competition System BETA <= V0.84 via the 'show_matchs.php' and 'persons.php' parameters. It allows an attacker to extract user credentials (name, password, email) from the database.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: PHP Competition System BETA <= V0.84
No auth needed
Prerequisites: Access to the vulnerable web application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (2)

Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/52487
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9438

Scores

EPSS 0.0023
EPSS Percentile 46.1%

Details

CWE
CWE-89
Status published
Products (1)
phpcompet.free/php_competition_system 0.84 beta
Published Aug 21, 2009
Tracked Since Feb 18, 2026