CVE-2020-37020

HIGH

SonarQube 8.3.1 - Privilege Escalation

Title source: llm
STIX 2.1

Description

SonarQube 8.3.1 contains an unquoted service path vulnerability that allows local attackers to gain SYSTEM privileges by exploiting the service executable path. Attackers can replace the wrapper.exe in the service path with a malicious executable to execute code with highest system privileges during service restart.

Exploits (1)

exploitdb WORKING POC
by Velayutham Selvaraj · textlocalwindows
https://www.exploit-db.com/exploits/48677

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 4.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-428
Status published
Published Jan 29, 2026
Tracked Since Feb 18, 2026