VYPR
High severity7.1NVD Advisory· Published Feb 3, 2026· Updated Apr 15, 2026

CVE-2020-37108

CVE-2020-37108

Description

PhpIX 2012 Professional contains a SQL injection vulnerability in the 'id' parameter of product_detail.php that allows remote attackers to manipulate database queries. Attackers can inject malicious SQL code through the 'id' parameter to potentially extract or modify database information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

PhpIX 2012 Professional is vulnerable to SQL injection via the 'id' parameter in product_detail.php, allowing remote attackers to extract or modify database information.

Vulnerability

Overview

CVE-2020-37108 is a SQL injection vulnerability found in PhpIX 2012 Professional, a product by All Hands Marketing Co., Ltd. The flaw resides in the product_detail.php script, where the id parameter is not properly sanitized before being used in a database query. This allows an attacker to inject arbitrary SQL commands by manipulating the id value in the HTTP request [2].

Exploitation

The attack is performed remotely without authentication. An attacker can inject SQL code through the id parameter, as demonstrated in the proof-of-concept: /product_detail.php?id=448578 [2]. The vulnerability is accessible via a web browser, and the vendor's site is listed as http://www.allhandsmarketing.com/ [1]. No special privileges or network position are required beyond the ability to send HTTP requests to the vulnerable endpoint.

Impact

Successful exploitation allows an attacker to extract sensitive data from the database, such as user credentials or other confidential information, or to modify database contents. The CVSS v3 score of 7.1 (High) reflects the potential for significant confidentiality and integrity impact, though the attack complexity of exploitation is low [2].

Mitigation

As of the publication date (2026-02-03), no official patch has not been patcheduled for analysis. The vendor, All Hands Marketing, may have released updates or patches; however, no specific mitigation is mentioned in the provided references. Users should contact the vendor for security updates or consider upgrading to a supported version of the software [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.