Cyber Posture

CVE-2020-37082

CriticalPublic PoC

Published: 03 February 2026

Published
03 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0032 55.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37082 is a critical-severity Files or Directories Accessible to External Parties (CWE-552) vulnerability in Weberp Weberp. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 44.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-22 directly requires restricting access to publicly accessible content to authorized users, preventing unauthenticated remote downloads of sensitive database backup files.

prevent

AC-3 enforces approved authorizations for logical access to system resources such as files, blocking direct unauthenticated access to Backup_[timestamp].sql.gz files.

prevent

CM-6 mandates secure configuration settings for web servers to deny public access to directories containing sensitive backup files.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1574.010 Services File Permissions Weakness Stealth
Adversaries may execute their own malicious payloads by hijacking the binaries used by services.
Why these techniques?

Unauthenticated remote access to database backup files via public-facing web application (T1190) due to externally accessible files from permissions weakness (T1044).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

webERP 4.15.1 contains an unauthenticated file access vulnerability that allows remote attackers to download database backup files without authentication. Attackers can directly access generated backup files in the companies/weberp/ directory by requesting the Backup_[timestamp].sql.gz file.

Deeper analysisAI

CVE-2020-37082 is an unauthenticated file access vulnerability affecting webERP version 4.15.1. The flaw enables remote attackers to download database backup files without authentication by directly requesting files named Backup_[timestamp].sql.gz located in the companies/weberp/ directory. It is classified under CWE-552 (Files or Directories Accessible to External Parties) and carries a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows attackers to obtain database backups, potentially exposing sensitive data stored within them and enabling further compromise depending on the contents.

Advisories and resources include project sites at weberp.org and SourceForge, an Exploit-DB entry (48420) with a proof-of-concept, and a Vulncheck advisory detailing the unauthenticated backup file access. Security practitioners should review these references for patch information and mitigation guidance.

Details

CWE(s)

Affected Products

weberp
weberp
4.15.1

CVEs Like This One

CVE-2019-25709Shared CWE-552
CVE-2026-33698Shared CWE-552
CVE-2025-69428Shared CWE-552
CVE-2024-12917Shared CWE-552
CVE-2026-35446Shared CWE-552
CVE-2026-34392Shared CWE-552
CVE-2026-34361Shared CWE-552
CVE-2025-26525Shared CWE-552
CVE-2025-41240Shared CWE-552
CVE-2025-69990Shared CWE-552

References