VYPR
High severity8.2NVD Advisory· Published Feb 7, 2026· Updated Apr 15, 2026

CVE-2020-37163

CVE-2020-37163

Description

QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate database queries through the '_located' parameter in the find_matches endpoint. Attackers can inject UNION-based SQL statements to extract database information including user credentials, database name, and system version.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

QuickDate 1.3.2 has a SQL injection in the find_matches endpoint via the '_located' parameter, allowing remote attackers to extract database contents.

Vulnerability

Overview

QuickDate 1.3.2, a PHP-based dating script, contains a SQL injection vulnerability in the find_matches endpoint. The _located parameter is not properly sanitized before being used in database queries, allowing an attacker to inject arbitrary SQL statements. This flaw enables UNION-based SQL injection, which can be exploited to extract sensitive information from the database [1][3].

Exploitation

The attack is performed by sending a crafted POST request to the /find_matches endpoint with a malicious _located parameter. No authentication is required, and the attacker only needs network access to the vulnerable application. The exploit does not require any special privileges or user interaction, making it easily exploitable by remote attackers [1].

Impact

Successful exploitation allows an attacker to retrieve database contents, including user credentials (such as usernames and password hashes), the database name, and the database system version. This information can be used to compromise user accounts or further attack the application and its infrastructure [1][3].

Mitigation

As of the publication date, no official patch has been released for QuickDate 1.3.2. The vendor's website (quickdatescript.com) is no longer accessible, suggesting the product may be abandoned or unsupported [2]. Users are advised to migrate to an alternative solution or implement input validation and parameterized queries as a workaround.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.