<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Com_hdwplayer 4.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/com_hdwplayer-4.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:18:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/com_hdwplayer-4.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Joomla com_hdwplayer 4.2 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-joomla-sqli/</link><pubDate>Wed, 13 May 2026 16:18:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-joomla-sqli/</guid><description>Joomla com_hdwplayer 4.2 contains an SQL injection vulnerability in the search.php file that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the hdwplayersearch parameter.</description><content:encoded><![CDATA[<p>Joomla com_hdwplayer 4.2 is vulnerable to SQL injection in the search.php file. Unauthenticated attackers can exploit this vulnerability by injecting malicious SQL code into the <code>hdwplayersearch</code> parameter of a POST request. This allows them to execute arbitrary SQL queries against the Joomla database. Successful exploitation can lead to the extraction of sensitive information from the <code>hdwplayer_videos</code> table, potentially compromising user data and application integrity. The vulnerability was reported in CVE-2020-37218.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Joomla site using com_hdwplayer version 4.2.</li>
<li>The attacker crafts a malicious SQL payload, designed to extract data from the <code>hdwplayer_videos</code> table.</li>
<li>The attacker sends an HTTP POST request to <code>search.php</code>.</li>
<li>The POST request includes the crafted SQL payload within the <code>hdwplayersearch</code> parameter.</li>
<li>The application fails to properly sanitize the <code>hdwplayersearch</code> parameter.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The database returns sensitive information from the <code>hdwplayer_videos</code> table.</li>
<li>The attacker receives the extracted data, such as usernames, passwords, or video metadata.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2020-37218) allows unauthenticated attackers to execute arbitrary SQL queries, potentially leading to the theft of sensitive information, such as usernames, passwords, and video metadata, from the Joomla database. The vulnerability exists in Joomla com_hdwplayer 4.2. While the precise number of affected installations is unknown, any Joomla site using this extension is potentially at risk. This could lead to data breaches, reputational damage, and legal liabilities for the affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for POST requests to <code>search.php</code> with suspicious SQL syntax in the <code>hdwplayersearch</code> parameter to detect exploitation attempts (see Sigma rule <code>Detect Joomla com_hdwplayer SQL Injection Attempt</code>).</li>
<li>Apply available patches or updates for com_hdwplayer to remediate the SQL injection vulnerability described in CVE-2020-37218.</li>
<li>Implement input validation and sanitization on the <code>hdwplayersearch</code> parameter to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect Joomla com_hdwplayer SQL Injection Successful</code> to identify successful exploitation by monitoring for database errors.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>joomla</category><category>cve-2020-37218</category><category>web-application</category></item></channel></rss>