CVE-2020-37076
Published: 03 February 2026
Summary
CVE-2020-37076 is a high-severity SQL Injection (CWE-89) vulnerability in Victor Cms Project Victor Cms. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection in the 'post' parameter of post.php by validating inputs against malicious UNION SELECT payloads and injection techniques.
Mitigates error-based SQL injection exploitation by suppressing database error messages that reveal structure for further attacks.
Filters outputs from post.php to block exfiltration of sensitive database information via successful boolean-based or time-based injections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in public-facing web application (CMS) directly enables T1190 (Exploit Public-Facing Application) and facilitates database data extraction via T1213.006 (Data from Information Repositories: Databases).
NVD Description
Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php that allows remote attackers to manipulate database queries. Attackers can exploit this vulnerability by sending crafted UNION SELECT payloads to extract database information through boolean-based,…
more
error-based, and time-based injection techniques.
Deeper analysisAI
CVE-2020-37076 is a SQL injection vulnerability (CWE-89) in Victor CMS version 1.0, specifically affecting the 'post' parameter in the post.php component. This flaw enables remote attackers to manipulate database queries by injecting malicious input, as detailed in the CVE description published on 2026-02-03.
The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact. Remote attackers require no privileges or user interaction and can exploit it by sending crafted UNION SELECT payloads via boolean-based, error-based, or time-based injection techniques to extract sensitive database information.
Advisories and related resources include the Victor CMS GitHub repository at https://github.com/VictorAlagwu/CMSsite, an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/48451, and a Vulncheck advisory at https://www.vulncheck.com/advisories/victor-cms-post-sql-injection; however, no specific patch or mitigation guidance is detailed in the provided information.
Details
- CWE(s)