VYPR
High severity8.2NVD Advisory· Published Jan 29, 2026· Updated Apr 15, 2026

CVE-2020-37006

CVE-2020-37006

Description

berliCRM 1.0.24 contains a SQL injection vulnerability in the 'src_record' parameter that allows remote attackers to manipulate database queries. Attackers can inject malicious SQL code through a crafted POST request to the index.php endpoint to potentially extract or modify database information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

berliCRM 1.0.24 SQL injection in src_record parameter allows remote authenticated attackers to extract or modify database information.

Vulnerability

Analysis

berliCRM version 1.0.24 is vulnerable to a SQL injection flaw in the src_record parameter passed via POST requests to index.php. The application fails to properly sanitize user input before incorporating it into SQL queries, enabling an attacker to manipulate the underlying database operations [2][3].

Exploitation

Conditions

An attacker must be authenticated with a valid session cookie to reach the vulnerable endpoint. The exploit is delivered through a crafted POST request where the src_record parameter contains a malicious payload, such as a time-based blind SQL injection that uses sleep() to exfiltrate data [2]. No special network position is required beyond standard HTTP access to the application.

Impact

Successful exploitation allows an attacker to extract sensitive information from the database, modify existing records, or even drop tables, potentially leading to complete compromise of the CRM system's data integrity and confidentiality. The CVSS v3 base score of 8.2 reflects the high confidentiality impact and low attack complexity [3].

Mitigation

As of the publication date, no official patch has been released for berliCRM 1.0.24. Users should upgrade to a later version or apply input validation and parameterized queries to mitigate the vulnerability. The exploit is publicly available, increasing the risk of active exploitation [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.