Description
SQL injection vulnerability in the SermonSpeaker (com_sermonspeaker) component before 3.2.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a latest_sermons action to index.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by SadHaCkEr · textwebappsphp
https://www.exploit-db.com/exploits/12184
References (6)
Core 6
Core References
Patch x_refsource_confirm
http://joomlacode.org/gf/project/sermon_speaker/news/?action=NewsThreadView&id=2549
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/12184
Patch x_refsource_confirm
http://joomlacode.org/gf/project/sermon_speaker/forum/?action=ForumBrowse&forum_id=7897&_forum_action=ForumMessageBrowse&thread_id=15219
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/39410
Exploit x_refsource_misc
http://packetstormsecurity.org/1004-exploits/joomlasermonspeaker-sql.txt
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39385
Scores
EPSS
0.0158
EPSS Percentile
81.7%
Details
CWE
CWE-89
Status
published
Products (2)
martin_hess/com_sermonspeaker
2.9
martin_hess/com_sermonspeaker
< 3.2.0
Published
Apr 19, 2010
Tracked Since
Feb 18, 2026