CVE-2020-37027
Remote Command Injection in Sickbeard Alpha via Extra Scripts
Publication date: 2026-01-30
Last updated on: 2026-01-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unknown_vendor | sickbeard | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Sickbeard alpha is a remote command injection flaw that allows unauthenticated attackers to execute arbitrary commands on the affected system. Attackers can insert malicious commands into the extra scripts configuration field and trigger their execution, leading to remote code execution on the vulnerable Sickbeard installation.
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution by attackers without any authentication, potentially allowing them to take full control of the affected Sickbeard system. This can result in unauthorized access, data compromise, system manipulation, or disruption of services.