VYPR
High severity8.2NVD Advisory· Published May 16, 2026· Updated May 18, 2026

CVE-2020-37243

CVE-2020-37243

Description

Supsystic Pricing Table 1.8.7 contains an SQL injection vulnerability in the 'sidx' GET parameter that allows unauthenticated attackers to execute arbitrary SQL queries through the getListForTbl action. The plugin also contains stored cross-site scripting vulnerabilities in the 'Edit name' and 'Edit HTML' fields that execute malicious scripts when viewing pricing tables.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Supsystic Pricing Table 1.8.7 has unauthenticated SQL injection via 'sidx' and stored XSS in edit fields, enabling data theft and script execution.

Vulnerability

Overview

CVE-2020-37243 affects Supsystic Pricing Table plugin versions 1.8.6 and 1.8.7. The plugin fails to sanitize user input in the sidx GET parameter when processing the getListForTbl action, leading to unauthenticated SQL injection [2][3]. Additionally, stored cross-site scripting (XSS) vulnerabilities exist in the 'Edit name' and 'Edit HTML' fields, allowing malicious scripts to be stored and executed when viewing pricing tables [2].

Exploitation

An unauthenticated attacker can exploit the SQL injection by sending a crafted GET request to the getListForTbl action with a malicious sidx parameter. The Exploit-DB entry [2] provides proof-of-concept payloads for boolean-based blind and time-based blind injection. For the stored XSS, an attacker with access to edit pricing tables (typically an administrator) can inject JavaScript into the name or HTML fields; the script then executes in the browser of any user viewing the affected table [2].

Impact

Successful SQL injection can lead to extraction of sensitive data from the WordPress database, including user credentials and site configuration. The stored XSS can be used to hijack admin sessions, deface pages, or redirect users to malicious sites. Both vulnerabilities can be chained to escalate privileges or compromise the entire WordPress installation [3].

Mitigation

The vendor released a patch on December 7, 2020, after being notified by the security researcher [2]. Users should update to the latest version of the plugin. No workarounds are documented; disabling the plugin until patched is recommended.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1