Cyber Posture

CVE-2020-36945

HighPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0040 60.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

WebDamn User Registration Login System contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating email credentials. Attackers can inject the payload '<email>' OR '1'='1' in both username and password fields to gain unauthorized access…

more

to the user panel.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of user inputs to the login form, directly preventing SQL injection payloads from manipulating authentication queries.

prevent

AC-3 enforces approved access authorizations, mitigating unauthorized entry to the user panel gained via authentication bypass.

preventrecover

SI-2 mandates identification, reporting, and correction of the SQL injection flaw in the WebDamn login system.

Security SummaryAI

CVE-2020-36945 is a SQL injection vulnerability (CWE-89) in the WebDamn User Registration Login System, a PHP/MySQL-based user management component. The flaw resides in the login authentication process, where attackers can manipulate email credentials to bypass verification. Specifically, injecting the payload '<email>' OR '1'='1' into both the username and password fields allows unauthorized access to the user panel. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility and significant confidentiality impact.

Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity and no user interaction or privileges required. By submitting the crafted SQL payload during login attempts, they bypass authentication entirely and gain access to the protected user panel, potentially exposing sensitive user data while enabling limited integrity modifications.

Advisories and references, including Exploit-DB (exploit 49170), Vulncheck, and the WebDamn project pages, document the issue and provide proof-of-concept details but do not specify patches or vendor mitigations in the available information. Security practitioners should review these sources for updates and consider input sanitization or prepared statements as standard SQL injection defenses.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing web login form enables unauthenticated authentication bypass, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References