Description
Multiple SQL injection vulnerabilities in Plume CMS 1.2.3 allow (1) remote authenticated users to execute arbitrary SQL commands via the m parameter to manager/index.php and (2) remote authenticated administrators to execute arbitrary SQL commands via the id parameter in an edit_link action to manager/tools.php. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Sense of Security · textwebappsphp
https://www.exploit-db.com/exploits/9424
References (2)
Core 2
Core References
URL Repurposed x_refsource_misc
http://www.senseofsecurity.com.au/advisories/SOS-09-006.pdf
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/36277
Scores
EPSS
0.0010
EPSS Percentile
28.0%
Details
CWE
CWE-89
Status
published
Products (1)
plume-cms/plume_cms
1.2.3
Published
Sep 25, 2009
Tracked Since
Feb 18, 2026