CVE-2009-3361

PHP-IPNMonitor - SQL Injection via maincat_id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3361. PoCs published by noname.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in PHP-IPNMonitor, allowing an attacker to extract user credentials from the database via a crafted UNION-based SQL query.

Description

SQL injection vulnerability in index.php in PHP-IPNMonitor allows remote attackers to execute arbitrary SQL commands via the maincat_id parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by noname · textwebappsphp
https://www.exploit-db.com/exploits/9647

This exploit demonstrates a SQL injection vulnerability in PHP-IPNMonitor, allowing an attacker to extract user credentials from the database via a crafted UNION-based SQL query.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: PHP-IPNMonitor (version not specified)
No auth needed
Prerequisites: Access to the vulnerable web application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (1)

Core 1
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9647

Scores

EPSS 0.0023
EPSS Percentile 46.1%

Details

CWE
CWE-89
Status published
Products (1)
paul_gibbs/php-ipnmonitor
Published Sep 24, 2009
Tracked Since Feb 18, 2026