<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Pricing Table — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/pricing-table/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:18:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/pricing-table/feed.xml" rel="self" type="application/rss+xml"/><item><title>Supsystic Pricing Table Plugin &lt;= 1.8.7 SQL Injection Vulnerability (CVE-2020-37243)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37243-supsystic-sql-injection/</link><pubDate>Sat, 16 May 2026 16:18:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37243-supsystic-sql-injection/</guid><description>Supsystic Pricing Table plugin version 1.8.7 contains an SQL injection vulnerability via the 'sidx' GET parameter, enabling unauthenticated attackers to execute arbitrary SQL queries through the getListForTbl action, as well as stored XSS vulnerabilities.</description><content:encoded><![CDATA[<p>Supsystic Pricing Table plugin version 1.8.7 is vulnerable to SQL injection via the &lsquo;sidx&rsquo; GET parameter. This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries by manipulating the getListForTbl action. Additionally, the plugin contains stored cross-site scripting (XSS) vulnerabilities in the &lsquo;Edit name&rsquo; and &lsquo;Edit HTML&rsquo; fields. These XSS vulnerabilities allow attackers to inject malicious scripts that are executed when users view the affected pricing tables. Successful exploitation of the SQL injection vulnerability could allow an attacker to read, modify, or delete sensitive data from the WordPress database. The XSS vulnerability can lead to session hijacking or arbitrary script execution in the context of the user&rsquo;s browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Supsystic Pricing Table plugin version 1.8.7.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the getListForTbl action, injecting SQL code into the &lsquo;sidx&rsquo; parameter.</li>
<li>The WordPress server processes the request, and the injected SQL code is executed against the database.</li>
<li>The attacker uses the SQL injection vulnerability to extract sensitive data such as user credentials, API keys, or other confidential information.</li>
<li>The attacker leverages stored XSS vulnerabilities by injecting malicious scripts into the &lsquo;Edit name&rsquo; or &lsquo;Edit HTML&rsquo; fields of a pricing table.</li>
<li>A legitimate user views the pricing table containing the injected XSS payload.</li>
<li>The malicious script executes within the user&rsquo;s browser, potentially stealing session cookies or redirecting the user to a phishing site.</li>
<li>The attacker uses the stolen session cookies to impersonate the user, gaining unauthorized access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability (CVE-2020-37243) can lead to complete database compromise, including unauthorized access to sensitive data, modification of website content, and potential privilege escalation. The stored XSS vulnerabilities allow attackers to inject malicious scripts that can hijack user sessions, deface websites, or redirect users to phishing sites. Given the widespread use of WordPress and its plugins, this vulnerability poses a significant risk to numerous websites and their users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Supsystic Pricing Table plugin to a version greater than 1.8.7 to patch the SQL injection vulnerability (CVE-2020-37243).</li>
<li>Apply input validation and sanitization to all user-supplied data, especially GET parameters, to prevent SQL injection attacks.</li>
<li>Implement a web application firewall (WAF) rule to detect and block SQL injection attempts targeting the &lsquo;sidx&rsquo; GET parameter.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2020-37243 Exploitation — Supsystic Pricing Table SQL Injection</code> to identify malicious HTTP requests exploiting this vulnerability.</li>
<li>Review pricing tables and sanitize suspicious content from &lsquo;Edit name&rsquo; and &lsquo;Edit HTML&rsquo; fields to mitigate stored XSS risks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>sql-injection</category><category>xss</category><category>wordpress</category><category>plugin</category></item></channel></rss>