Description
Multiple SQL injection vulnerabilities in SenseSites CommonSense CMS allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) special.php, (2) article.php, or (3) cat2.php.
Exploits (3)
exploitdb
WRITEUP
VERIFIED
by H4ckCity Security Team · textwebappsphp
https://www.exploit-db.com/exploits/37941
exploitdb
WRITEUP
VERIFIED
by H4ckCity Security Team · textwebappsphp
https://www.exploit-db.com/exploits/37940
exploitdb
WRITEUP
VERIFIED
by H4ckCity Security Team · textwebappsphp
https://www.exploit-db.com/exploits/37942
References (2)
Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/72158
Exploit x_refsource_misc
http://packetstormsecurity.org/files/108426/CommonSense-CMS-Blind-SQL-Injection.html
Scores
EPSS
0.0045
EPSS Percentile
63.9%
Details
CWE
CWE-89
Status
published
Products (1)
michau_enterprises_llc/commonsense_cms
Published
Oct 09, 2012
Tracked Since
Feb 18, 2026