Back to Library

Google Dork: Powered by XOOPS 2.2.3...

Finds websites powered by XOOPS 2.2.3 Final which contains known security vulnerabilities that were patched in later versions.

Beginner Friendly
Use with caution
vulnerability

Google Dork Query:

Powered by XOOPS 2.2.3 Final
0
Not verified

What It Does

This dork targets websites running XOOPS CMS version 2.2.3 Final, a specific legacy release with multiple known security vulnerabilities including XSS, SQL injection, and path traversal. The query matches the exact footer signature this version displays by default. Results reveal sites running this outdated 2005-era CMS version that have not been updated in nearly two decades.

Common Use Cases

  • Version-Specific Vulnerability Scanning: Pinpoint websites running exactly XOOPS 2.2.3 Final, which has documented vulnerabilities including CVE-2005-3532 (SQL injection) and CVE-2005-3926 (directory traversal), enabling targeted security assessments.
  • Legacy Infrastructure Identification: Discover organizations still operating on XOOPS 2.2.3, indicating severely outdated infrastructure that likely hasn't received security patches in years and may serve as an entry point during authorized testing.
  • Web Application Firewall Bypass Research: Study how unpatched XOOPS 2.2.3 installations handle input validation to understand historical vulnerability patterns and test whether modern WAF rules adequately protect these legacy systems.

How to Use Safely

  1. Search Google for "Powered by XOOPS 2.2.3 Final" to identify websites displaying this specific version string in their footer, confirming they run this exact vulnerable release.
  2. Verify each result is a live, active XOOPS installation by visiting the site and checking for the characteristic XOOPS layout, module structure, and admin paths (/modules/, /admin.php).
  3. Research known CVEs for XOOPS 2.2.3 in the National Vulnerability Database and cross-reference with available exploit documentation to understand the attack surface.
  4. If the site is within your authorized testing scope, document the findings and recommend immediate upgrade or migration; if not, report through the site's contact or CERT channels.

Responsible Use Required

This dork should only be used on systems you own or have explicit authorization to test. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and obtain proper permission before testing.