CVE-2020-37082
Published: 03 February 2026
Summary
CVE-2020-37082 is a critical-severity Files or Directories Accessible to External Parties (CWE-552) vulnerability in Weberp Weberp. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 44.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-22 directly requires restricting access to publicly accessible content to authorized users, preventing unauthenticated remote downloads of sensitive database backup files.
AC-3 enforces approved authorizations for logical access to system resources such as files, blocking direct unauthenticated access to Backup_[timestamp].sql.gz files.
CM-6 mandates secure configuration settings for web servers to deny public access to directories containing sensitive backup files.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote access to database backup files via public-facing web application (T1190) due to externally accessible files from permissions weakness (T1044).
NVD Description
webERP 4.15.1 contains an unauthenticated file access vulnerability that allows remote attackers to download database backup files without authentication. Attackers can directly access generated backup files in the companies/weberp/ directory by requesting the Backup_[timestamp].sql.gz file.
Deeper analysisAI
CVE-2020-37082 is an unauthenticated file access vulnerability affecting webERP version 4.15.1. The flaw enables remote attackers to download database backup files without authentication by directly requesting files named Backup_[timestamp].sql.gz located in the companies/weberp/ directory. It is classified under CWE-552 (Files or Directories Accessible to External Parties) and carries a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows attackers to obtain database backups, potentially exposing sensitive data stored within them and enabling further compromise depending on the contents.
Advisories and resources include project sites at weberp.org and SourceForge, an Exploit-DB entry (48420) with a proof-of-concept, and a Vulncheck advisory detailing the unauthenticated backup file access. Security practitioners should review these references for patch information and mitigation guidance.
Details
- CWE(s)