CVE-2009-3063
com_gameserver 1.0 for Joomla! - SQL Injection via id Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2009-3063. PoCs published by v3n0m.
AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in Joomla Component com_gameserver 1.0. The PoC uses a crafted URL to extract user credentials from the database via a UNION-based SQL injection.
Description
SQL injection vulnerability in the Game Server (com_gameserver) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a gamepanel action to index.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by v3n0m · textwebappsphp
https://www.exploit-db.com/exploits/9571
This exploit demonstrates a SQL injection vulnerability in Joomla Component com_gameserver 1.0. The PoC uses a crafted URL to extract user credentials from the database via a UNION-based SQL injection.
Classification
Working Poc 95%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:
Joomla Component com_gameserver 1.0
No auth needed
Prerequisites:
Target must have the vulnerable Joomla component installed and accessible
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (3)
Core 3
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/36213
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/9571
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2523
Scores
EPSS
0.0032
EPSS Percentile
55.5%
Details
CWE
CWE-89
Status
published
Products (1)
indianpulses/com_gameserver
1.0
Published
Sep 03, 2009
Tracked Since
Feb 18, 2026