<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Supsystic — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/supsystic/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:19:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/supsystic/feed.xml" rel="self" type="application/rss+xml"/><item><title>Supsystic Digital Publications Path Traversal and Stored XSS Vulnerability (CVE-2020-37245)</title><link>https://feed.craftedsignal.io/briefs/2026-05-supsystic-path-traversal-xss/</link><pubDate>Sat, 16 May 2026 16:19:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-supsystic-path-traversal-xss/</guid><description>Supsystic Digital Publications 1.6.9 contains a path traversal vulnerability in the Folder input field, allowing attackers to access sensitive files, and a stored XSS vulnerability due to improper input sanitization, leading to arbitrary script execution in the context of affected users (CVE-2020-37245).</description><content:encoded><![CDATA[<p>Supsystic Digital Publications version 1.6.9 is a WordPress plugin that suffers from both a path traversal and a stored cross-site scripting (XSS) vulnerability. The path traversal, identified as CVE-2020-37245, is located in the &lsquo;Folder&rsquo; input field and allows unauthenticated attackers to access arbitrary files outside of the web root by injecting directory traversal sequences (e.g., ../). The plugin also fails to properly sanitize input fields within publication settings, specifically &lsquo;Area Width&rsquo; and &lsquo;Publication Width&rsquo;, leading to stored XSS. Successful exploitation allows an attacker to execute arbitrary JavaScript code in the context of other users who view or edit the publications, potentially leading to session hijacking, defacement, or further malicious actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Supsystic Digital Publications 1.6.9 installation.</li>
<li>The attacker crafts a malicious HTTP request to exploit the path traversal vulnerability by injecting directory traversal sequences in the <code>Folder</code> input field.</li>
<li>The server processes the request without proper validation, allowing the attacker to read arbitrary files outside the web root.</li>
<li>Alternatively, the attacker injects malicious JavaScript code into the &lsquo;Area Width&rsquo; or &lsquo;Publication Width&rsquo; parameters within the publication settings.</li>
<li>The server stores the unsanitized JavaScript code in the WordPress database.</li>
<li>A legitimate user views or edits the publication containing the injected XSS payload.</li>
<li>The user&rsquo;s browser executes the malicious JavaScript code, potentially stealing cookies or redirecting to a malicious site.</li>
<li>The attacker leverages the stolen session cookie or the ability to inject content to further compromise the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the path traversal vulnerability (CVE-2020-37245) allows an attacker to read sensitive files on the server, potentially exposing credentials, configuration files, or other confidential information. The stored XSS vulnerability allows attackers to inject malicious scripts that execute in the context of other users, potentially leading to account takeover, data theft, or defacement of the website. This can impact any WordPress website running the vulnerable version of the plugin until it&rsquo;s patched or removed. The CVSS v3.1 base score for CVE-2020-37245 is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Supsystic Digital Publications that addresses the path traversal and XSS vulnerabilities.</li>
<li>Apply input validation and sanitization to all user-supplied input, especially in publication settings, to prevent XSS attacks.</li>
<li>Implement proper access controls and file permission restrictions to limit the impact of path traversal vulnerabilities.</li>
<li>Monitor web server logs for suspicious activity, such as requests containing directory traversal sequences, to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Supsystic Path Traversal</code> to identify exploitation attempts in web server logs.</li>
<li>Deploy the Sigma rule <code>Detect Supsystic XSS Attempt</code> to detect potential attempts to inject malicious Javascript into publication parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>xss</category><category>wordpress</category><category>plugin</category></item><item><title>CVE-2020-37244: Supsystic Membership 1.4.7 Unauthenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37244-supsystic-sqli/</link><pubDate>Sat, 16 May 2026 16:19:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37244-supsystic-sqli/</guid><description>Supsystic Membership version 1.4.7 is vulnerable to SQL injection (CVE-2020-37244), allowing unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'search' and 'sidx' parameters, potentially extracting sensitive database information.</description><content:encoded><![CDATA[<p>Supsystic Membership plugin version 1.4.7 is susceptible to SQL injection attacks due to insufficient input validation on the &lsquo;search&rsquo; and &lsquo;sidx&rsquo; parameters within the badges module. This vulnerability, identified as CVE-2020-37244, enables unauthenticated remote attackers to inject arbitrary SQL queries via crafted GET requests. Successful exploitation allows the attacker to read, modify, or delete sensitive data stored in the application&rsquo;s database. The vulnerable software is a WordPress plugin. Attackers leverage this flaw to compromise the integrity of the WordPress site and gain unauthorized access to sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running the vulnerable Supsystic Membership plugin version 1.4.7.</li>
<li>The attacker crafts a malicious GET request targeting the badges module.</li>
<li>The attacker injects SQL code into the &lsquo;search&rsquo; or &lsquo;sidx&rsquo; parameter of the GET request.</li>
<li>The web server processes the request and executes the injected SQL query against the database.</li>
<li>The attacker uses time-based blind or UNION-based SQL injection techniques to extract sensitive data, bypassing normal authentication mechanisms.</li>
<li>The extracted data may include user credentials, personal information, or other sensitive business data stored in the database.</li>
<li>The attacker analyzes the extracted data to identify further attack vectors or valuable information.</li>
<li>The attacker may use the compromised database to gain administrative access to the WordPress site, or to exfiltrate data for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability can lead to unauthorized access to sensitive information stored in the WordPress site&rsquo;s database. This includes user credentials, personal information, and other confidential data. A successful attack could result in data breaches, identity theft, financial losses, and reputational damage to the affected organization. Given the unauthenticated nature of the vulnerability, any website running the vulnerable plugin is susceptible to attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Supsystic Membership plugin to a version beyond 1.4.7 to remediate CVE-2020-37244.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2020-37244 Supsystic Membership SQL Injection Attempt</code> to monitor for exploitation attempts.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in web applications.</li>
<li>Monitor web server logs for suspicious GET requests containing SQL injection payloads, focusing on the &lsquo;search&rsquo; and &lsquo;sidx&rsquo; parameters in requests to the badges module, as covered by the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2020-37244</category><category>wordpress</category><category>unauthenticated</category></item><item><title>Supsystic Pricing Table Plugin &lt;= 1.8.7 SQL Injection Vulnerability (CVE-2020-37243)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37243-supsystic-sql-injection/</link><pubDate>Sat, 16 May 2026 16:18:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37243-supsystic-sql-injection/</guid><description>Supsystic Pricing Table plugin version 1.8.7 contains an SQL injection vulnerability via the 'sidx' GET parameter, enabling unauthenticated attackers to execute arbitrary SQL queries through the getListForTbl action, as well as stored XSS vulnerabilities.</description><content:encoded><![CDATA[<p>Supsystic Pricing Table plugin version 1.8.7 is vulnerable to SQL injection via the &lsquo;sidx&rsquo; GET parameter. This vulnerability allows unauthenticated attackers to execute arbitrary SQL queries by manipulating the getListForTbl action. Additionally, the plugin contains stored cross-site scripting (XSS) vulnerabilities in the &lsquo;Edit name&rsquo; and &lsquo;Edit HTML&rsquo; fields. These XSS vulnerabilities allow attackers to inject malicious scripts that are executed when users view the affected pricing tables. Successful exploitation of the SQL injection vulnerability could allow an attacker to read, modify, or delete sensitive data from the WordPress database. The XSS vulnerability can lead to session hijacking or arbitrary script execution in the context of the user&rsquo;s browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Supsystic Pricing Table plugin version 1.8.7.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the getListForTbl action, injecting SQL code into the &lsquo;sidx&rsquo; parameter.</li>
<li>The WordPress server processes the request, and the injected SQL code is executed against the database.</li>
<li>The attacker uses the SQL injection vulnerability to extract sensitive data such as user credentials, API keys, or other confidential information.</li>
<li>The attacker leverages stored XSS vulnerabilities by injecting malicious scripts into the &lsquo;Edit name&rsquo; or &lsquo;Edit HTML&rsquo; fields of a pricing table.</li>
<li>A legitimate user views the pricing table containing the injected XSS payload.</li>
<li>The malicious script executes within the user&rsquo;s browser, potentially stealing session cookies or redirecting the user to a phishing site.</li>
<li>The attacker uses the stolen session cookies to impersonate the user, gaining unauthorized access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability (CVE-2020-37243) can lead to complete database compromise, including unauthorized access to sensitive data, modification of website content, and potential privilege escalation. The stored XSS vulnerabilities allow attackers to inject malicious scripts that can hijack user sessions, deface websites, or redirect users to phishing sites. Given the widespread use of WordPress and its plugins, this vulnerability poses a significant risk to numerous websites and their users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Supsystic Pricing Table plugin to a version greater than 1.8.7 to patch the SQL injection vulnerability (CVE-2020-37243).</li>
<li>Apply input validation and sanitization to all user-supplied data, especially GET parameters, to prevent SQL injection attacks.</li>
<li>Implement a web application firewall (WAF) rule to detect and block SQL injection attempts targeting the &lsquo;sidx&rsquo; GET parameter.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2020-37243 Exploitation — Supsystic Pricing Table SQL Injection</code> to identify malicious HTTP requests exploiting this vulnerability.</li>
<li>Review pricing tables and sanitize suspicious content from &lsquo;Edit name&rsquo; and &lsquo;Edit HTML&rsquo; fields to mitigate stored XSS risks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>sql-injection</category><category>xss</category><category>wordpress</category><category>plugin</category></item><item><title>Supsystic Ultimate Maps SQL Injection Vulnerability (CVE-2020-37242)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37242-sqli/</link><pubDate>Sat, 16 May 2026 16:18:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37242-sqli/</guid><description>Supsystic Ultimate Maps 1.1.12 is vulnerable to SQL injection via the 'sidx' GET parameter, allowing unauthenticated attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>Supsystic Ultimate Maps is a WordPress plugin that allows users to create custom maps. Version 1.1.12 of this plugin contains a critical SQL injection vulnerability (CVE-2020-37242). Unauthenticated attackers can exploit this vulnerability by injecting malicious SQL code into the &lsquo;sidx&rsquo; GET parameter when calling the &lsquo;getListForTbl&rsquo; action. Successful exploitation allows attackers to execute arbitrary SQL queries, potentially leading to the extraction of sensitive database information. This vulnerability poses a significant risk to websites using the affected plugin, as it could result in data breaches and compromise of user information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website running Supsystic Ultimate Maps version 1.1.12.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>getListForTbl</code> action with a SQL injection payload in the <code>sidx</code> parameter.</li>
<li>The malicious GET request is sent to the WordPress website.</li>
<li>The WordPress plugin processes the request without proper sanitization of the <code>sidx</code> parameter.</li>
<li>The injected SQL code is executed against the website&rsquo;s database.</li>
<li>The attacker uses boolean-based or time-based blind SQL injection techniques to extract data.</li>
<li>Sensitive information, such as usernames, passwords, or other database records, is retrieved.</li>
<li>The attacker exfiltrates the stolen data for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2020-37242 can lead to the complete compromise of the vulnerable website&rsquo;s database. Attackers can gain access to sensitive information, including user credentials, personal data, and other confidential data stored in the database. This can result in data breaches, identity theft, financial loss, and reputational damage for the website owner and its users. The CVSS v3.1 base score for this vulnerability is 8.2, indicating a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Supsystic Ultimate Maps to a patched version that addresses CVE-2020-37242 to remediate the SQL injection vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2020-37242 Exploitation — SQL Injection in Supsystic Ultimate Maps</code> to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious GET requests to the <code>getListForTbl</code> action containing SQL injection payloads in the <code>sidx</code> parameter as covered by the detection rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2020-37242</category><category>sql-injection</category><category>wordpress</category></item></channel></rss>