<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2020-37242 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2020-37242/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:18:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2020-37242/feed.xml" rel="self" type="application/rss+xml"/><item><title>Supsystic Ultimate Maps SQL Injection Vulnerability (CVE-2020-37242)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37242-sqli/</link><pubDate>Sat, 16 May 2026 16:18:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37242-sqli/</guid><description>Supsystic Ultimate Maps 1.1.12 is vulnerable to SQL injection via the 'sidx' GET parameter, allowing unauthenticated attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>Supsystic Ultimate Maps is a WordPress plugin that allows users to create custom maps. Version 1.1.12 of this plugin contains a critical SQL injection vulnerability (CVE-2020-37242). Unauthenticated attackers can exploit this vulnerability by injecting malicious SQL code into the &lsquo;sidx&rsquo; GET parameter when calling the &lsquo;getListForTbl&rsquo; action. Successful exploitation allows attackers to execute arbitrary SQL queries, potentially leading to the extraction of sensitive database information. This vulnerability poses a significant risk to websites using the affected plugin, as it could result in data breaches and compromise of user information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website running Supsystic Ultimate Maps version 1.1.12.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>getListForTbl</code> action with a SQL injection payload in the <code>sidx</code> parameter.</li>
<li>The malicious GET request is sent to the WordPress website.</li>
<li>The WordPress plugin processes the request without proper sanitization of the <code>sidx</code> parameter.</li>
<li>The injected SQL code is executed against the website&rsquo;s database.</li>
<li>The attacker uses boolean-based or time-based blind SQL injection techniques to extract data.</li>
<li>Sensitive information, such as usernames, passwords, or other database records, is retrieved.</li>
<li>The attacker exfiltrates the stolen data for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2020-37242 can lead to the complete compromise of the vulnerable website&rsquo;s database. Attackers can gain access to sensitive information, including user credentials, personal data, and other confidential data stored in the database. This can result in data breaches, identity theft, financial loss, and reputational damage for the website owner and its users. The CVSS v3.1 base score for this vulnerability is 8.2, indicating a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Supsystic Ultimate Maps to a patched version that addresses CVE-2020-37242 to remediate the SQL injection vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2020-37242 Exploitation — SQL Injection in Supsystic Ultimate Maps</code> to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious GET requests to the <code>getListForTbl</code> action containing SQL injection payloads in the <code>sidx</code> parameter as covered by the detection rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2020-37242</category><category>sql-injection</category><category>wordpress</category></item></channel></rss>