VYPR
High severity8.2NVD Advisory· Published May 16, 2026· Updated May 18, 2026

CVE-2020-37244

CVE-2020-37244

Description

Supsystic Membership 1.4.7 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'search' and 'sidx' parameters. Attackers can send GET requests to the badges module with crafted payloads to extract sensitive database information using time-based blind or UNION-based SQL injection techniques.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Supsystic Membership 1.4.7 SQL injection in 'search' and 'sidx' parameters allows unauthenticated attackers to extract database data via time-based blind or UNION queries.

Vulnerability

Overview

The Supsystic Membership plugin for WordPress, version 1.4.7, contains an SQL injection vulnerability in the badges module. The GET parameters search and sidx are not sanitized before being used in database queries, allowing an attacker to inject arbitrary SQL commands [2][3]. This flaw is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) [3].

Exploitation

An unauthenticated attacker can exploit this vulnerability by sending crafted GET requests to the badges.getTblList endpoint. The exploit can be performed using tools like sqlmap or manual payloads. The provided proof-of-concept demonstrates both time-based blind and UNION-based SQL injection techniques [2]. No authentication is required, and the attack is network-based with low complexity [3].

Impact

Successful exploitation allows an attacker to extract sensitive information from the database, such as user credentials, session tokens, or other confidential data. The CVSS v3 score is 8.2 (High), with high confidentiality impact and low integrity impact [3].

Mitigation

The vulnerability was fixed on December 22, 2020, after the WordPress Plugin Security team intervened [2]. Users should update to a patched version of the plugin. No workarounds are documented, and the vendor did not respond to initial disclosure attempts [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.