eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can leverage SQLMap to exploit the vulnerability, potentially gaining remote code execution by uploading backdoor files to the web application directory.
eLection 2.0 - 'id' SQL Injection
Problem type
Affected products
Tripath Project
2.0 - AFFECTED
References
https://www.exploit-db.com/exploits/48122
https://sourceforge.net/projects/election-by-tripath/
https://github.com/J3rryBl4nks/eLection-TriPath-/blob/master/SQLiIntoRCE.md
https://www.vulncheck.com/advisories/election-id-sql-injection
GitHub Security Advisories
GHSA-cgfw-66j9-q2xp
eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management...
https://github.com/advisories/GHSA-cgfw-66j9-q2xpeLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can leverage SQLMap to exploit the vulnerability, potentially gaining remote code execution by uploading backdoor files to the web application directory.
https://nvd.nist.gov/vuln/detail/CVE-2020-37154
https://github.com/J3rryBl4nks/eLection-TriPath-/blob/master/SQLiIntoRCE.md
https://sourceforge.net/projects/election-by-tripath
https://www.exploit-db.com/exploits/48122
https://www.vulncheck.com/advisories/election-id-sql-injection
https://github.com/advisories/GHSA-cgfw-66j9-q2xp
JSON source
https://cveawg.mitre.org/api/cve/CVE-2020-37154Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2020-37154",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-02-06T23:14:08.762Z",
"dateReserved": "2026-02-03T16:27:45.309Z",
"datePublished": "2026-02-06T23:14:08.762Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-02-06T23:14:08.762Z"
},
"datePublic": "2020-02-21T00:00:00.000Z",
"title": "eLection 2.0 - 'id' SQL Injection",
"descriptions": [
{
"lang": "en",
"value": "eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can leverage SQLMap to exploit the vulnerability, potentially gaining remote code execution by uploading backdoor files to the web application directory."
}
],
"affected": [
{
"vendor": "Tripath Project",
"product": "eLection",
"versions": [
{
"version": "2.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/48122",
"name": "ExploitDB-48122",
"tags": [
"exploit"
]
},
{
"url": "https://sourceforge.net/projects/election-by-tripath/",
"name": "eLection Project Vendor Homepage",
"tags": [
"product"
]
},
{
"url": "https://github.com/J3rryBl4nks/eLection-TriPath-/blob/master/SQLiIntoRCE.md",
"name": "Researcher Exploit Disclosure",
"tags": [
"technical-description",
"exploit"
]
},
{
"url": "https://www.vulncheck.com/advisories/election-id-sql-injection",
"name": "VulnCheck Advisory: eLection 2.0 - 'id' SQL Injection",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "J3rryBl4nks",
"type": "finder"
}
]
}
}
}