<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Membership 1.4.7 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/membership-1.4.7/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:19:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/membership-1.4.7/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2020-37244: Supsystic Membership 1.4.7 Unauthenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37244-supsystic-sqli/</link><pubDate>Sat, 16 May 2026 16:19:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37244-supsystic-sqli/</guid><description>Supsystic Membership version 1.4.7 is vulnerable to SQL injection (CVE-2020-37244), allowing unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'search' and 'sidx' parameters, potentially extracting sensitive database information.</description><content:encoded><![CDATA[<p>Supsystic Membership plugin version 1.4.7 is susceptible to SQL injection attacks due to insufficient input validation on the &lsquo;search&rsquo; and &lsquo;sidx&rsquo; parameters within the badges module. This vulnerability, identified as CVE-2020-37244, enables unauthenticated remote attackers to inject arbitrary SQL queries via crafted GET requests. Successful exploitation allows the attacker to read, modify, or delete sensitive data stored in the application&rsquo;s database. The vulnerable software is a WordPress plugin. Attackers leverage this flaw to compromise the integrity of the WordPress site and gain unauthorized access to sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running the vulnerable Supsystic Membership plugin version 1.4.7.</li>
<li>The attacker crafts a malicious GET request targeting the badges module.</li>
<li>The attacker injects SQL code into the &lsquo;search&rsquo; or &lsquo;sidx&rsquo; parameter of the GET request.</li>
<li>The web server processes the request and executes the injected SQL query against the database.</li>
<li>The attacker uses time-based blind or UNION-based SQL injection techniques to extract sensitive data, bypassing normal authentication mechanisms.</li>
<li>The extracted data may include user credentials, personal information, or other sensitive business data stored in the database.</li>
<li>The attacker analyzes the extracted data to identify further attack vectors or valuable information.</li>
<li>The attacker may use the compromised database to gain administrative access to the WordPress site, or to exfiltrate data for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability can lead to unauthorized access to sensitive information stored in the WordPress site&rsquo;s database. This includes user credentials, personal information, and other confidential data. A successful attack could result in data breaches, identity theft, financial losses, and reputational damage to the affected organization. Given the unauthenticated nature of the vulnerability, any website running the vulnerable plugin is susceptible to attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Supsystic Membership plugin to a version beyond 1.4.7 to remediate CVE-2020-37244.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2020-37244 Supsystic Membership SQL Injection Attempt</code> to monitor for exploitation attempts.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in web applications.</li>
<li>Monitor web server logs for suspicious GET requests containing SQL injection payloads, focusing on the &lsquo;search&rsquo; and &lsquo;sidx&rsquo; parameters in requests to the badges module, as covered by the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2020-37244</category><category>wordpress</category><category>unauthenticated</category></item></channel></rss>