VYPR
Moderate severityNVD Advisory· Published Dec 30, 2020· Updated Aug 4, 2024

CVE-2020-5811

CVE-2020-5811

Description

An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated path traversal in Umbraco CMS package installation allows arbitrary file writes outside the site home, potentially leading to remote code execution.

Vulnerability

Overview

CVE-2020-5811 is an authenticated path traversal vulnerability in Umbraco CMS versions up to and including 8.9.1. The flaw exists during package installation, where insufficient validation of file paths allows an attacker to write files outside the intended site home directory [1][2]. This occurs because the package installation process does not properly sanitize or restrict the destination paths specified within a package manifest.

Exploitation

To exploit this vulnerability, an attacker must be authenticated and have the ability to install packages. By crafting a malicious Umbraco package with path traversal sequences (e.g., ../) in file paths, the attacker can write arbitrary files to arbitrary locations on the server's filesystem [1]. No additional privileges beyond package installation rights are required, though in practice, package installation is typically restricted to administrators.

Impact

Successful exploitation enables an attacker to write files outside the web root, potentially overwriting critical system files, configuration files, or placing a web shell. This can lead to remote code execution (RCE) under the context of the web server [1]. The Tenable advisory notes that if an attacker first escalates privileges via stored XSS (CVE-2020-5809 or CVE-2020-5810), they could then install a malicious package and achieve RCE, making this path traversal a key component in a broader attack chain.

Mitigation

Umbraco has addressed this vulnerability in versions after 8.9.1. Users are strongly advised to upgrade to the latest supported version. No workarounds are documented; restricting package installation to trusted users only can reduce risk but does not eliminate the vulnerability [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
UmbracoCmsNuGet
< 8.9.28.9.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.