{"api_version":"1","generated_at":"2026-04-10T03:00:07+00:00","cve":"CVE-2008-7091","urls":{"html":"https://cve.report/CVE-2008-7091","api":"https://cve.report/api/cve/CVE-2008-7091.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-7091","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-7091"},"summary":{"title":"CVE-2008-7091","description":"Multiple SQL injection vulnerabilities in Pligg 9.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2009-08-26 14:24:00","updated_at":"2018-10-11 20:58:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/archive/1/494987/100/0/threaded","name":"20080730 Pligg <= 9.9.0 Multiple Vulnerabilities","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/50197","name":"50197","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.gulftech.org/?node=research&article_id=00120-07312008","name":"http://www.gulftech.org/?node=research&article_id=00120-07312008","refsource":"MISC","tags":["Exploit"],"title":"Contact Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/50190","name":"50190","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.osvdb.org/50195","name":"50195","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.osvdb.org/50192","name":"50192","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.osvdb.org/50191","name":"50191","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.exploit-db.com/exploits/6173","name":"6173","refsource":"EXPLOIT-DB","tags":[],"title":"Pligg <= 9.9.0 (XSS/LFI/SQL) Multiple Remote Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/30458","name":"30458","refsource":"BID","tags":["Exploit"],"title":"Pligg Multiple Remote Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.osvdb.org/50196","name":"50196","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44193","name":"pligg-multiple-sql-injection(44193)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/50198","name":"50198","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.osvdb.org/50189","name":"50189","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.osvdb.org/50193","name":"50193","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.osvdb.org/50194","name":"50194","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-7091","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-7091","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"7091","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pligg","cpe5":"pligg_cms","cpe6":"9.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"7091","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pligg","cpe5":"pligg_cms","cpe6":"9.9.0","cpe7":"beta","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"7091","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pligg","cpe5":"pligg_cms","cpe6":"9.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"7091","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pligg","cpe5":"pligg_cms","cpe6":"9.9.0","cpe7":"beta","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"7091","vulnerable":"1","versionEndIncluding":"9.9.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pligg","cpe5":"pligg_cms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-7091","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple SQL injection vulnerabilities in Pligg 9.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"50191","refsource":"OSVDB","url":"http://www.osvdb.org/50191"},{"name":"pligg-multiple-sql-injection(44193)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44193"},{"name":"50198","refsource":"OSVDB","url":"http://www.osvdb.org/50198"},{"name":"50195","refsource":"OSVDB","url":"http://www.osvdb.org/50195"},{"name":"50193","refsource":"OSVDB","url":"http://www.osvdb.org/50193"},{"name":"http://www.gulftech.org/?node=research&article_id=00120-07312008","refsource":"MISC","url":"http://www.gulftech.org/?node=research&article_id=00120-07312008"},{"name":"20080730 Pligg <= 9.9.0 Multiple Vulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/494987/100/0/threaded"},{"name":"50194","refsource":"OSVDB","url":"http://www.osvdb.org/50194"},{"name":"30458","refsource":"BID","url":"http://www.securityfocus.com/bid/30458"},{"name":"50190","refsource":"OSVDB","url":"http://www.osvdb.org/50190"},{"name":"50192","refsource":"OSVDB","url":"http://www.osvdb.org/50192"},{"name":"50189","refsource":"OSVDB","url":"http://www.osvdb.org/50189"},{"name":"50196","refsource":"OSVDB","url":"http://www.osvdb.org/50196"},{"name":"50197","refsource":"OSVDB","url":"http://www.osvdb.org/50197"},{"name":"6173","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/6173"}]}},"nvd":{"publishedDate":"2009-08-26 14:24:00","lastModifiedDate":"2018-10-11 20:58:00","problem_types":["CWE-89"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pligg:pligg_cms:*:*:*:*:*:*:*:*","versionEndIncluding":"9.9.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pligg:pligg_cms:9.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pligg:pligg_cms:9.9.0:beta:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"7091","Ordinal":"40024","Title":"CVE-2008-7091","CVE":"CVE-2008-7091","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"7091","Ordinal":"1","NoteData":"Multiple SQL injection vulnerabilities in Pligg 9.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.","Type":"Description","Title":null},{"CveYear":"2008","CveId":"7091","Ordinal":"2","NoteData":"2009-08-26","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"7091","Ordinal":"3","NoteData":"2018-10-11","Type":"Other","Title":"Modified"}]}}}