CVE-2009-4428

Joomla! com_joomportfolio 1.0.0 - SQL Injection

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-4428. PoCs published by Fl0riX & Snakespc.

AI-analyzed exploit summary This exploit demonstrates an SQL injection vulnerability in the 'com_joomportfolio' component for Joomla!. The crafted URL injects a UNION-based SQL query to extract usernames, password hashes, and database user information from the 'jos_users' table.

Description

SQL injection vulnerability in the JoomPortfolio (com_joomportfolio) component 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the secid parameter in a showcat action to index.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Fl0riX & Snakespc · textwebappsphp
https://www.exploit-db.com/exploits/33418

This exploit demonstrates an SQL injection vulnerability in the 'com_joomportfolio' component for Joomla!. The crafted URL injects a UNION-based SQL query to extract usernames, password hashes, and database user information from the 'jos_users' table.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Joomla! with com_joomportfolio component
No auth needed
Prerequisites: Target must have the vulnerable 'com_joomportfolio' component installed · SQL query must be compatible with the target database schema
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/37403
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/54912
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/37838
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/61138

Scores

EPSS 0.0020
EPSS Percentile 42.1%

Details

CWE
CWE-89
Status published
Products (1)
joomplace/com_joomportfolio 1.0.0
Published Dec 28, 2009
Tracked Since Feb 18, 2026