CVE-2020-37076
Published: 03 February 2026
Description
Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php that allows remote attackers to manipulate database queries. Attackers can exploit this vulnerability by sending crafted UNION SELECT payloads to extract database information through boolean-based,…
more
error-based, and time-based injection techniques.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection in the 'post' parameter of post.php by validating inputs against malicious UNION SELECT payloads and injection techniques.
Mitigates error-based SQL injection exploitation by suppressing database error messages that reveal structure for further attacks.
Filters outputs from post.php to block exfiltration of sensitive database information via successful boolean-based or time-based injections.
Security SummaryAI
CVE-2020-37076 is a SQL injection vulnerability (CWE-89) in Victor CMS version 1.0, specifically affecting the 'post' parameter in the post.php component. This flaw enables remote attackers to manipulate database queries by injecting malicious input, as detailed in the CVE description published on 2026-02-03.
The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact. Remote attackers require no privileges or user interaction and can exploit it by sending crafted UNION SELECT payloads via boolean-based, error-based, or time-based injection techniques to extract sensitive database information.
Advisories and related resources include the Victor CMS GitHub repository at https://github.com/VictorAlagwu/CMSsite, an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/48451, and a Vulncheck advisory at https://www.vulncheck.com/advisories/victor-cms-post-sql-injection; however, no specific patch or mitigation guidance is detailed in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in public-facing web application (CMS) directly enables T1190 (Exploit Public-Facing Application) and facilitates database data extraction via T1213.006 (Data from Information Repositories: Databases).