Platform
php
Component
school-erp-pro
Fixed in
1.0.1
CVE-2020-37088 describes an arbitrary file access vulnerability discovered in School ERP Pro. This flaw allows unauthenticated attackers to read sensitive files from the server by manipulating the 'document' parameter within the download.php script. The vulnerability impacts versions 1.0 through 1.0 of School ERP Pro, and a patch is required to remediate the issue.
The primary impact of CVE-2020-37088 is the potential for unauthorized access to sensitive data. An attacker exploiting this vulnerability can read arbitrary files on the server, including configuration files that may contain database credentials, API keys, or other sensitive information. Successful exploitation could lead to complete compromise of the School ERP Pro system and potentially the underlying server. This vulnerability is particularly concerning because it requires no authentication, making it easily exploitable by a wide range of attackers.
CVE-2020-37088 was publicly disclosed on 2026-02-03. No public proof-of-concept exploits are currently known. The vulnerability's simplicity suggests a moderate likelihood of exploitation if left unpatched. It is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
2.09% (84% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2020-37088 is to upgrade to a patched version of School ERP Pro as soon as it becomes available. Until a patch is applied, consider implementing temporary workarounds such as restricting access to the download.php script using a web application firewall (WAF) or proxy server. Configure the WAF to block requests containing directory traversal sequences (e.g., '../') in the 'document' parameter. Carefully review file permissions to ensure that sensitive files are not accessible by the web server user. After applying a patch, verify the fix by attempting to access a sensitive file through the download.php script with a directory traversal payload; access should be denied.
Update to a patched version or apply the security measures provided by the vendor. Verify and sanitize the 'document' parameter input in download.php to prevent directory traversal. Limit access to sensitive files and configure system permissions correctly.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2020-37088 is a vulnerability in School ERP Pro 1.0–1.0 that allows unauthenticated attackers to read arbitrary files by manipulating the 'document' parameter, potentially exposing sensitive data.
If you are running School ERP Pro version 1.0, you are potentially affected. Check your installation and upgrade as soon as a patch is available.
The recommended fix is to upgrade to a patched version of School ERP Pro. Until then, implement WAF rules to block directory traversal attempts.
There are currently no confirmed reports of active exploitation, but the vulnerability's simplicity makes it a potential target.
Refer to the School ERP Pro vendor website or security mailing lists for official advisories and patch releases.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.