← Back to CVEs
CVE-2020-37154
HIGH7.1
Description
eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can leverage SQLMap to exploit the vulnerability, potentially gaining remote code execution by uploading backdoor files to the web application directory.
CVE Details
CVSS v3.1 Score7.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/7/2026
Last Modified2/9/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-89
References
https://github.com/J3rryBl4nks/eLection-TriPath-/blob/master/SQLiIntoRCE.md(disclosure@vulncheck.com)
https://sourceforge.net/projects/election-by-tripath/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/48122(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/election-id-sql-injection(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.