VYPR
High severity7.1NVD Advisory· Published Feb 3, 2026· Updated Apr 15, 2026

CVE-2020-37105

CVE-2020-37105

Description

PMB 5.6 contains a SQL injection vulnerability in the administration download script that allows authenticated attackers to execute arbitrary SQL commands through the 'logid' parameter. Attackers can leverage this vulnerability by sending crafted requests to the /admin/sauvegarde/download.php endpoint with manipulated logid values to interact with the database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

PMB 5.6 SQL injection in /admin/sauvegarde/download.php via logid parameter allows authenticated attackers to execute arbitrary SQL commands.

Vulnerability

Description

CVE-2020-37105 is a SQL injection vulnerability in PMB version 5.6 and earlier. The flaw resides in the administration download script at /admin/sauvegarde/download.php, where the logid parameter is not properly sanitized before being used in SQL queries. This allows an authenticated attacker with administration privileges to inject arbitrary SQL commands [1][3].

Exploitation

To exploit the vulnerability, an attacker must be authenticated with administration-level access to the PMB application. They can then send a crafted HTTP GET request to the vulnerable endpoint, manipulating the logid parameter to inject malicious SQL statements. The exploit is straightforward and can be automated using tools like SQLMap, as demonstrated in public proof-of-concept code [3].

Impact

Successful exploitation allows an attacker to execute arbitrary SQL commands against the underlying database. This can lead to extraction of sensitive data, such as user credentials, bibliographic records, and other stored information. The attacker could also modify or delete database content, potentially compromising the integrity and availability of the library management system [4].

Mitigation

According to the vendor, PMB 5.6 is an older release, and the vulnerability has been addressed in later versions. Users are strongly advised to upgrade to the latest stable release of PMB, such as version 8.0.1 or later, which includes security fixes [1]. There is no known workaround for this vulnerability other than upgrading.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.