CVE-2009-4983

Silurus Classifieds 1.0 - Cross-Site Scripting via ID and Keywords Parameters

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 3 public exploits for CVE-2009-4983. PoCs published by Moudi.

AI-analyzed exploit summary This exploit demonstrates a reflected XSS vulnerability in Silurus System 1.0 by injecting a malicious script into the 'ID' parameter of 'wcategory.php'. The script executes arbitrary JavaScript in the context of the affected site, potentially stealing cookies.

Description

Multiple cross-site scripting (XSS) vulnerabilities in Silurus Classifieds 1.0 allow remote attackers to inject arbitrary web script or HTML via the ID parameter to (1) category.php and (2) wcategory.php, and the (3) keywords parameter to search.php.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34644

This exploit demonstrates a reflected XSS vulnerability in Silurus System 1.0 by injecting a malicious script into the 'ID' parameter of 'wcategory.php'. The script executes arbitrary JavaScript in the context of the affected site, potentially stealing cookies.

Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: Silurus System 1.0
No auth needed
Prerequisites: Access to the vulnerable web application
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →
exploitdb WORKING POC VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34645

This exploit demonstrates a cross-site scripting (XSS) vulnerability in Silurus System 1.0 by injecting a malicious script into the 'keywords' parameter of the search.php page. The script executes arbitrary JavaScript in the context of the affected site, potentially stealing cookie-based authentication credentials.

Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: Silurus System 1.0
No auth needed
Prerequisites: Access to the vulnerable search.php endpoint
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →
exploitdb WORKING POC VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34643

This exploit demonstrates a reflected XSS vulnerability in Silurus System 1.0 by injecting a malicious script into the 'ID' parameter of category.php, which executes arbitrary JavaScript in the context of the affected site.

Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: Silurus System 1.0
No auth needed
Prerequisites: Access to the vulnerable web application
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (2)

Core 2
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/36124

Scores

EPSS 0.0018
EPSS Percentile 39.1%

Details

CWE
CWE-79
Status published
Products (1)
snowhall/silurus_system 1.0
Published Aug 25, 2010
Tracked Since Feb 18, 2026