Exploitation Summary
EIP tracks 1 public exploit for CVE-2009-3209. PoCs published by MuShTaQ.
AI-analyzed exploit summary This exploit demonstrates a remote SQL injection vulnerability in PHP Email Manager. The PoC uses a UNION-based SQL injection to extract admin credentials (email and password hash) from the database.
Description
SQL injection vulnerability in remove.php in PHP eMail Manager 3.3.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by MuShTaQ · textwebappsphp
https://www.exploit-db.com/exploits/9470
This exploit demonstrates a remote SQL injection vulnerability in PHP Email Manager. The PoC uses a UNION-based SQL injection to extract admin credentials (email and password hash) from the database.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:
PHP Email Manager (version not specified)
No auth needed
Prerequisites:
Target must be running vulnerable PHP Email Manager · remove.php must be accessible
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/52548
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/57171
Exploit x_refsource_misc
http://packetstormsecurity.org/0908-exploits/phpem-sql.txt
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/36346
Scores
EPSS
0.0017
EPSS Percentile
37.6%
Details
CWE
CWE-89
Status
published
Products (1)
raizlabs/php_email_manager
3.3.0
Published
Sep 16, 2009
Tracked Since
Feb 18, 2026