CVE-2009-3193

uwix com_digifolio 1.52 - SQL Injection via id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3193. PoCs published by v3n0m.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in Joomla's com_digifolio component version 1.52. The PoC uses a UNION-based SQL injection to extract usernames and passwords from the jos_users table.

Description

SQL injection vulnerability in the DigiFolio (com_digifolio) component 1.52 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a project action to index.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by v3n0m · textwebappsphp
https://www.exploit-db.com/exploits/9534

This exploit demonstrates a SQL injection vulnerability in Joomla's com_digifolio component version 1.52. The PoC uses a UNION-based SQL injection to extract usernames and passwords from the jos_users table.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Joomla com_digifolio 1.52
No auth needed
Prerequisites: Target must have Joomla with com_digifolio 1.52 installed
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (1)

Core 1
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9534

Scores

EPSS 0.0023
EPSS Percentile 46.1%

Details

CWE
CWE-89
Status published
Products (1)
uwix/com_digifolio 1.52
Published Sep 15, 2009
Tracked Since Feb 18, 2026