CVE-2020-12478
Description
TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated attacker can retrieve arbitrary files from the TeamPass web root, including backups and LDAP debug files.
Vulnerability
Overview
CVE-2020-12478 affects TeamPass version 2.1.27.36, a collaborative password manager. The vulnerability stems from insufficient access controls on the web server, allowing any unauthenticated user who can interact with the instance to retrieve files from the web root [1][3]. Specifically, sensitive directories such as upload/, backups/, files/, and avatars/ are exposed without authentication, and directory listing may be enabled, making it easier to discover hashed filenames [3].
Attack
Vector
An unauthenticated attacker with network access to the TeamPass web server can simply send HTTP GET requests to known file paths, for example curl http:///teampass/files/ldap.debug.txt [3]. The vulnerability does not require any authentication or prior knowledge; the attacker can enumerate or guess paths to retrieve stored files, including user-uploaded content, backup archives, and generated PDFs [3].
Impact
Successful exploitation can lead to the disclosure of sensitive data stored within TeamPass. This includes encrypted file uploads, profile pictures, database backups, and LDAP debug logs that may contain credentials or configuration details [1][3]. Although uploads are encrypted, an attacker could retrieve them for offline analysis; plain-text backups or debug files present a direct information disclosure risk. The exposure of backup files could lead to full credential compromise if encryption keys are also obtainable.
Mitigation
Status
The issue was reported via GitHub and fixed in subsequent releases. Users are advised to upgrade to a patched version of TeamPass (2.1.27.37 or later). Administrators should also disable directory listing on the web server and restrict access to sensitive directories only to authenticated users [2][3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- TeamPass/TeamPassdescription
- ghsa-coords
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-83h6-22cp-f22wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-12478ghsaADVISORY
- github.com/nilsteampassnet/TeamPass/issues/2764ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.