3
Xoops is prone to multiple SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query.
An attacker may be able to exploit these issues to modify the logic of SQL queries. Successful exploits may allow the attacker to compromise the software, retrieve information, or modify data; other consequences are possible as well.
Xoops 2.0.16 is vulnerable.
More Information Here :
http://www.securityfocus.com/bid/22399/infoSubZero
XOOPSDesign.com