Description
Multiple SQL injection vulnerabilities in LiSK CMS 4.4 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter in a view_inbox action to cp/cp_messages.php or (2) the id parameter to cp/edit_email.php.
Exploits (1)
exploitdb
WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/12727
References (3)
Core 3
Core References
Exploit x_refsource_misc
http://www.htbridge.ch/advisory/sql_injection_vulnerability_in_lisk_cms.html
Exploit x_refsource_misc
http://www.htbridge.ch/advisory/sql_injection_vulnerability_in_lisk_cms_1.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39912
Scores
EPSS
0.0011
EPSS Percentile
28.6%
Details
CWE
CWE-89
Status
published
Products (1)
createch-group/lisk_cms
4.4 (6 CPE variants)
Published
May 24, 2010
Tracked Since
Feb 18, 2026