CVE-2020-37219
Description
Joomla com_fabrik 3.9.11 contains a directory traversal vulnerability that allows unauthenticated attackers to list arbitrary files by manipulating the folder parameter. Attackers can send GET requests to the onAjax_files method with path traversal sequences to enumerate files in system directories outside the intended web root.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Joomla com_fabrik 3.9.11 directory traversal allows unauthenticated attackers to list arbitrary files via the folder parameter in the onAjax_files method.
Vulnerability
Overview CVE-2020-37219 is a directory traversal vulnerability in the Joomla component com_fabrik version 3.9.11. The flaw resides in the onAjax_files method, which fails to properly sanitize the folder parameter, allowing path traversal sequences such as ../ to escape the intended web root directory [1][4]. This improper limitation of a pathname to a restricted directory (CWE-22) enables an attacker to list files in arbitrary directories on the server.
Exploitation
The vulnerability can be exploited by sending a crafted GET request to the onAjax_files endpoint with a manipulated folder parameter containing traversal sequences. No authentication is required, making the attack surface broad for any publicly accessible Joomla site running the vulnerable component [1]. The exploit is publicly available, lowering the barrier for attackers.
Impact
An unauthenticated attacker can enumerate files and directories outside the web root, potentially revealing sensitive information such as configuration files, database credentials, or other system details [4]. While the vulnerability only allows listing (not reading) files, the disclosed information can aid in further attacks.
Mitigation
Users should upgrade com_fabrik to a version later than 3.9.11, as the vulnerability affects versions up to and including that release [4]. The vendor has since released newer versions (e.g., v4.6.4) that address this issue [2]. As the CVE is from 2020 and an exploit exists, immediate patching is recommended.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.