CVE-2009-3326

CMScontrol 7.x - SQL Injection via id_menu Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3326. PoCs published by ph1l1ster.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in CMScontrol 7.* via the 'id_menu' parameter. It extracts user credentials (username and password) from the 'users' table using a UNION-based attack.

Description

SQL injection vulnerability in index.php in CMScontrol Content Management System 7.x allows remote attackers to execute arbitrary SQL commands via the id_menu parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ph1l1ster · textwebappsmultiple
https://www.exploit-db.com/exploits/9727

This exploit demonstrates a SQL injection vulnerability in CMScontrol 7.* via the 'id_menu' parameter. It extracts user credentials (username and password) from the 'users' table using a UNION-based attack.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: CMScontrol 7.*
No auth needed
Prerequisites: A vulnerable CMScontrol 7.* installation with exposed 'id_menu' parameter
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (1)

Core 1
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9727

Scores

EPSS 0.0010
EPSS Percentile 27.6%

Details

CWE
CWE-89
Status published
Products (1)
cmscontrol/cmscontrol 7
Published Sep 23, 2009
Tracked Since Feb 18, 2026