Cyber Posture

CVE-2020-37082

CriticalPublic PoC

Published: 03 February 2026

Published
03 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0032 55.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

webERP 4.15.1 contains an unauthenticated file access vulnerability that allows remote attackers to download database backup files without authentication. Attackers can directly access generated backup files in the companies/weberp/ directory by requesting the Backup_[timestamp].sql.gz file.

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-22 directly requires restricting access to publicly accessible content to authorized users, preventing unauthenticated remote downloads of sensitive database backup files.

prevent

AC-3 enforces approved authorizations for logical access to system resources such as files, blocking direct unauthenticated access to Backup_[timestamp].sql.gz files.

prevent

CM-6 mandates secure configuration settings for web servers to deny public access to directories containing sensitive backup files.

Security SummaryAI

CVE-2020-37082 is an unauthenticated file access vulnerability affecting webERP version 4.15.1. The flaw enables remote attackers to download database backup files without authentication by directly requesting files named Backup_[timestamp].sql.gz located in the companies/weberp/ directory. It is classified under CWE-552 (Files or Directories Accessible to External Parties) and carries a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows attackers to obtain database backups, potentially exposing sensitive data stored within them and enabling further compromise depending on the contents.

Advisories and resources include project sites at weberp.org and SourceForge, an Exploit-DB entry (48420) with a proof-of-concept, and a Vulncheck advisory detailing the unauthenticated backup file access. Security practitioners should review these references for patch information and mitigation guidance.

Details

CWE(s)

Affected Products

weberp
weberp
4.15.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1574.010 Services File Permissions Weakness Stealth
Adversaries may execute their own malicious payloads by hijacking the binaries used by services.
Why these techniques?

Unauthenticated remote access to database backup files via public-facing web application (T1190) due to externally accessible files from permissions weakness (T1044).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References