VYPR
High severity7.5NVD Advisory· Published May 13, 2026· Updated May 13, 2026

CVE-2020-37219

CVE-2020-37219

Description

Joomla com_fabrik 3.9.11 contains a directory traversal vulnerability that allows unauthenticated attackers to list arbitrary files by manipulating the folder parameter. Attackers can send GET requests to the onAjax_files method with path traversal sequences to enumerate files in system directories outside the intended web root.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Joomla com_fabrik 3.9.11 directory traversal allows unauthenticated attackers to list arbitrary files via the folder parameter in the onAjax_files method.

Vulnerability

Overview CVE-2020-37219 is a directory traversal vulnerability in the Joomla component com_fabrik version 3.9.11. The flaw resides in the onAjax_files method, which fails to properly sanitize the folder parameter, allowing path traversal sequences such as ../ to escape the intended web root directory [1][4]. This improper limitation of a pathname to a restricted directory (CWE-22) enables an attacker to list files in arbitrary directories on the server.

Exploitation

The vulnerability can be exploited by sending a crafted GET request to the onAjax_files endpoint with a manipulated folder parameter containing traversal sequences. No authentication is required, making the attack surface broad for any publicly accessible Joomla site running the vulnerable component [1]. The exploit is publicly available, lowering the barrier for attackers.

Impact

An unauthenticated attacker can enumerate files and directories outside the web root, potentially revealing sensitive information such as configuration files, database credentials, or other system details [4]. While the vulnerability only allows listing (not reading) files, the disclosed information can aid in further attacks.

Mitigation

Users should upgrade com_fabrik to a version later than 3.9.11, as the vulnerability affects versions up to and including that release [4]. The vendor has since released newer versions (e.g., v4.6.4) that address this issue [2]. As the CVE is from 2020 and an exploit exists, immediate patching is recommended.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.