CVE-2009-3191

PAD Site Scripts 3.6 - Cross-Site Scripting via cat Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3191. PoCs published by Mr.SQL.

AI-analyzed exploit summary The exploit demonstrates a remote SQL injection vulnerability in PAD Site Scripts v3.6 via the 'list.php' parameter 'string'. It also includes an XSS vulnerability in 'rss.php' and 'opml.php' via the 'cat' parameter. The SQLi payload extracts table and column names from the INFORMATION_SCHEMA.

Description

Multiple cross-site scripting (XSS) vulnerabilities in PAD Site Scripts 3.6 allow remote attackers to inject arbitrary web script or HTML via the cat parameter to (1) rss.php and (2) opml.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/9531

The exploit demonstrates a remote SQL injection vulnerability in PAD Site Scripts v3.6 via the 'list.php' parameter 'string'. It also includes an XSS vulnerability in 'rss.php' and 'opml.php' via the 'cat' parameter. The SQLi payload extracts table and column names from the INFORMATION_SCHEMA.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: PAD Site Scripts v3.6
No auth needed
Prerequisites: Access to the target web application
devstral-2 · analyzed Feb 18, 2026 Full analysis →

References (2)

Core 2
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9531
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2434

Scores

EPSS 0.0031
EPSS Percentile 54.6%

Details

CWE
CWE-79
Status published
Products (1)
pad-site-scripts/pad_site_scripts 3.6
Published Sep 15, 2009
Tracked Since Feb 18, 2026