CVE-2020-36972

SmartBlog 2.0.1 contains a blind SQL injection vulnerability in the 'id_post' parameter of the details controller that allows attackers to extract database information. Attackers can systematically test and retrieve database contents by injecting crafted SQL queries that compare character-by-character of database information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartdatasoft:smartblog:2.0.1:*:*:*:*:prestashop:*:*

History

09 Feb 2026, 17:57

Type Values Removed Values Added
First Time Smartdatasoft
Smartdatasoft smartblog
References () https://github.com/smartdatasoft/smartblog - () https://github.com/smartdatasoft/smartblog - Product
References () https://www.exploit-db.com/exploits/48995 - () https://www.exploit-db.com/exploits/48995 - Exploit
References () https://www.vulncheck.com/advisories/smartblog-idpost-blind-sql-injection - () https://www.vulncheck.com/advisories/smartblog-idpost-blind-sql-injection - Third Party Advisory
CPE cpe:2.3:a:smartdatasoft:smartblog:2.0.1:*:*:*:*:prestashop:*:*

28 Jan 2026, 22:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/48995 - () https://www.exploit-db.com/exploits/48995 -

28 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-28 18:16

Updated : 2026-02-09 17:57


NVD link : CVE-2020-36972

Mitre link : CVE-2020-36972

CVE.ORG link : CVE-2020-36972


JSON object : View

Products Affected

smartdatasoft

  • smartblog
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')