VYPR
Unrated severityNVD Advisory· Published Aug 26, 2009· Updated Apr 23, 2026

CVE-2008-7091

CVE-2008-7091

Description

Multiple SQL injection vulnerabilities in Pligg 9.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.

Affected products

3
  • Pligg/Pligg CMS3 versions
    cpe:2.3:a:pligg:pligg_cms:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:pligg:pligg_cms:*:*:*:*:*:*:*:*range: <=9.9.0
    • cpe:2.3:a:pligg:pligg_cms:9.5:*:*:*:*:*:*:*
    • cpe:2.3:a:pligg:pligg_cms:9.9.0:beta:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

15

News mentions

0

No linked articles in our index yet.