Cyber Posture

CVE-2020-37076

HighPublic PoC

Published: 03 February 2026

Published
03 February 2026
Modified
10 February 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0013 32.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php that allows remote attackers to manipulate database queries. Attackers can exploit this vulnerability by sending crafted UNION SELECT payloads to extract database information through boolean-based,…

more

error-based, and time-based injection techniques.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection in the 'post' parameter of post.php by validating inputs against malicious UNION SELECT payloads and injection techniques.

prevent

Mitigates error-based SQL injection exploitation by suppressing database error messages that reveal structure for further attacks.

prevent

Filters outputs from post.php to block exfiltration of sensitive database information via successful boolean-based or time-based injections.

Security SummaryAI

CVE-2020-37076 is a SQL injection vulnerability (CWE-89) in Victor CMS version 1.0, specifically affecting the 'post' parameter in the post.php component. This flaw enables remote attackers to manipulate database queries by injecting malicious input, as detailed in the CVE description published on 2026-02-03.

The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact. Remote attackers require no privileges or user interaction and can exploit it by sending crafted UNION SELECT payloads via boolean-based, error-based, or time-based injection techniques to extract sensitive database information.

Advisories and related resources include the Victor CMS GitHub repository at https://github.com/VictorAlagwu/CMSsite, an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/48451, and a Vulncheck advisory at https://www.vulncheck.com/advisories/victor-cms-post-sql-injection; however, no specific patch or mitigation guidance is detailed in the provided information.

Details

CWE(s)

Affected Products

victor cms project
victor cms
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing web application (CMS) directly enables T1190 (Exploit Public-Facing Application) and facilitates database data extraction via T1213.006 (Data from Information Repositories: Databases).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References