MEDIUM SeverityCVSS 4.06.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVE-2020-37246
Last updated May 16, 2026 · Published May 16, 2026
Description
Supsystic Backup 2.3.9 contains a local file inclusion vulnerability that allows unauthenticated attackers to read and delete arbitrary files by manipulating the download path parameter. Attackers can modify the download parameter in admin.php requests with directory traversal sequences to access sensitive files like /etc/passwd or delete files via the removeAction parameter.
Affected products
1 listed- Supsystic:Backup
Mappings
CWE
CWE-98
CAPEC
None listed.
Related
Research
- Command injection: how it works and how to prevent itCommand injection happens when untrusted input reaches a shell or process spawn. Avoid the shell, pass…
- Template InjectionExplains how untrusted input can be executed by template engines on server or client. Covers safe templating…
- Path traversal: how to detect and prevent itPath traversal lets attackers read or write files outside intended directories. Normalise paths, resolve them…
CVE® content © MITRE Corporation. Licensed under the CVE Terms of Use. Terms
