{"vulnerability": "CVE-2020-2662", "sightings": [{"uuid": "f4d0cf1f-6fc6-4708-b182-3e13ecd69049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26625", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16718", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-26625\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the 'user_id' parameter after the login portal.\n\ud83d\udccf Published: 2024-01-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-16T17:18:39.995Z\n\ud83d\udd17 References:\n1. https://github.com/GilaCMS/gila\n2. http://gilacms.com\n3. https://github.com/GilaCMS/gila/security/policy\n4. https://packetstormsecurity.com/files/176301/GilaCMS-1.15.4-SQL-Injection.html", "creation_timestamp": "2025-05-16T17:34:44.000000Z"}, {"uuid": "f40b5eb7-51c3-4659-9759-58dfafb7ee48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26625", "type": "seen", "source": "https://t.me/ctinow/171832", "content": "https://ift.tt/tLwpkqW\nCVE-2020-26625 | Gila CMS up to 1.15.4 user_id sql injection (ID 176301)", "creation_timestamp": "2024-01-23T10:26:58.000000Z"}, {"uuid": "79091c65-8587-4662-b2e4-8db734dd2b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26623", "type": "seen", "source": "https://t.me/ctinow/171830", "content": "https://ift.tt/4pPWtqF\nCVE-2020-26623 | Gila CMS up to 1.15.4 Login Portal Area sql injection (ID 176301)", "creation_timestamp": "2024-01-23T10:26:56.000000Z"}, {"uuid": "bc19b0ea-d820-4205-9720-215091f9d65f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26627", "type": "seen", "source": "https://t.me/ctinow/165679", "content": "https://ift.tt/td5jnlA\nCVE-2020-26627", "creation_timestamp": "2024-01-10T10:26:46.000000Z"}, {"uuid": "bbc3e932-fba0-4ba3-b9c8-9750c573cc29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26627", "type": "seen", "source": "https://t.me/ctinow/168961", "content": "https://ift.tt/Egrjl3G\nCVE-2020-26627 Exploit", "creation_timestamp": "2024-01-16T19:16:45.000000Z"}, {"uuid": "22f6cf01-51fa-4024-be0f-86d1f09b5718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26628", "type": "seen", "source": "https://t.me/ctinow/168960", "content": "https://ift.tt/1S93rQM\nCVE-2020-26628 Exploit", "creation_timestamp": "2024-01-16T19:16:42.000000Z"}, {"uuid": "aae545b4-948c-4979-be7c-7901acb72cd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26629", "type": "seen", "source": "https://t.me/ctinow/168959", "content": "https://ift.tt/xEyoZM6\nCVE-2020-26629 Exploit", "creation_timestamp": "2024-01-16T19:16:40.000000Z"}, {"uuid": "2b4d9fb5-2cd6-4cf0-88b1-d5a28271d014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/ctinow/171942", "content": "https://ift.tt/aw2T83l\nCVE-2020-26624 | Gila CMS up to 1.15.4 Login Portal ID sql injection (ID 176301)", "creation_timestamp": "2024-01-23T13:31:50.000000Z"}, {"uuid": "18ec738f-b4cd-4c55-9601-778cce701f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26625", "type": "seen", "source": "https://t.me/ctinow/162089", "content": "https://ift.tt/4SkyFuA\nCVE-2020-26625", "creation_timestamp": "2024-01-02T23:26:50.000000Z"}, {"uuid": "a130e917-525b-4e51-a2de-08bd1bbdb918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/ctinow/162088", "content": "https://ift.tt/3hzAbeI\nCVE-2020-26624", "creation_timestamp": "2024-01-02T23:26:49.000000Z"}, {"uuid": "7764b5a9-189e-4946-aaf8-346bf922a17a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26623", "type": "seen", "source": "https://t.me/ctinow/162087", "content": "https://ift.tt/HIvOhXe\nCVE-2020-26623", "creation_timestamp": "2024-01-02T23:26:48.000000Z"}, {"uuid": "d6d80806-255c-4880-a02a-a6b9b97cc64c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26625", "type": "seen", "source": "https://t.me/ctinow/165143", "content": "https://ift.tt/YM5UbPs\nCVE-2020-26625 Exploit", "creation_timestamp": "2024-01-09T17:17:30.000000Z"}, {"uuid": "a96256f9-34f4-49ce-9af1-7bf83a3ba4cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/ctinow/164841", "content": "https://ift.tt/BGd6FSJ\nCVE-2020-26624 Exploit", "creation_timestamp": "2024-01-09T08:16:05.000000Z"}, {"uuid": "2b79690c-5b66-406d-9746-9bd9cba763a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26625", "type": "seen", "source": "https://t.me/cibsecurity/74207", "content": "\u203c\ufe0fCVE-2020-26625\u203c\ufe0f\n\nA SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the 'userid' parameter after the login portal.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:47.000000Z"}, {"uuid": "6cedd36d-c45e-47cb-bf74-09343e0cdcb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26625", "type": "seen", "source": "https://t.me/arpsyndicate/2865", "content": "#ExploitObserverAlert\n\nCVE-2020-26625\n\nDESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2020-26625. A SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the 'user_id' parameter after the login portal.\n\nFIRST-EPSS: 0.001110000\nNVD-IS: 2.5\nNVD-ES: 1.2", "creation_timestamp": "2024-01-16T17:16:15.000000Z"}, {"uuid": "c8ae3ed1-f9eb-47f8-ab6d-d5378b106988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26624", "type": "seen", "source": "https://t.me/cibsecurity/74206", "content": "\u203c\ufe0fCVE-2020-26624\u203c\ufe0f\n\nA SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the ID parameter after the login portal.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:43.000000Z"}, {"uuid": "3aee754d-72e6-47b0-a34b-1e847afaec58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26623", "type": "seen", "source": "https://t.me/cibsecurity/74205", "content": "\u203c\ufe0fCVE-2020-26623\u203c\ufe0f\n\nSQL Injection vulnerability discovered in Gila CMS 1.15.4 and earlier allows a remote attacker to execute arbitrary web scripts via the Area parameter under the AdministrationWidget tab after the login portal.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:38.000000Z"}, {"uuid": "cfafd4b0-2840-47aa-af5e-ec0df70fa611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26629", "type": "seen", "source": "https://t.me/ctinow/174873", "content": "https://ift.tt/prHvIJl\nCVE-2020-26629 | Hospital Management System 4.0 JQuery unrestricted upload (ID 176302)", "creation_timestamp": "2024-01-28T09:56:38.000000Z"}, {"uuid": "1775c478-7a62-4a36-8ac9-6f2a5055fa7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26628", "type": "seen", "source": "https://t.me/ctinow/174872", "content": "https://ift.tt/tH0iyou\nCVE-2020-26628 | Hospital Management System 4.0 Edit Profile Page username cross site scripting (ID 176302)", "creation_timestamp": "2024-01-28T09:56:37.000000Z"}, {"uuid": "39047554-701a-4c55-99ea-1474dd87ea5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26627", "type": "seen", "source": "https://t.me/ctinow/174865", "content": "https://ift.tt/g7PxC2Z\nCVE-2020-26627 | Hospital Management System 4.0 Admin Remark sql injection (ID 176302)", "creation_timestamp": "2024-01-28T09:26:53.000000Z"}, {"uuid": "bed22692-d06e-4cad-a8c8-4674373b4d25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26623", "type": "seen", "source": "https://t.me/ctinow/164840", "content": "https://ift.tt/M0QRL9d\nCVE-2020-26623 Exploit", "creation_timestamp": "2024-01-09T08:16:04.000000Z"}, {"uuid": "646d5f9f-3c2b-4b32-a486-b9b6e3a4b324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26629", "type": "seen", "source": "https://t.me/ctinow/165681", "content": "https://ift.tt/FdIGWmU\nCVE-2020-26629", "creation_timestamp": "2024-01-10T10:26:49.000000Z"}, {"uuid": "e9ab3f71-1bee-407c-8089-f5dd1ff3ec3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-26628", "type": "seen", "source": "https://t.me/ctinow/165680", "content": "https://ift.tt/IZT8gqw\nCVE-2020-26628", "creation_timestamp": "2024-01-10T10:26:47.000000Z"}]}