Platform
laravel
Component
voyager
Fixed in
1.3.1
CVE-2020-37214 represents a directory traversal vulnerability discovered in Voyager CMS. This flaw allows unauthorized access to sensitive system files by manipulating the asset path parameter within the /admin/voyager-assets endpoint. Versions 1.3.0 and earlier are affected, and a patch is available in version 1.3.1.
Successful exploitation of CVE-2020-37214 grants an attacker the ability to read arbitrary files on the server. This includes critical configuration files like .env which may contain database credentials, API keys, and other sensitive information. Access to files such as /etc/passwd could expose user account details. The blast radius extends to the entire server, as the attacker can potentially gain control over the application and underlying system. This vulnerability shares similarities with other directory traversal exploits where attackers leverage predictable path structures to bypass access controls.
CVE-2020-37214 was publicly disclosed on 2026-02-11. There are currently known public proof-of-concept exploits available. The vulnerability's severity is rated HIGH (CVSS 7.5). It is not currently listed on CISA KEV, but its ease of exploitation warrants monitoring for potential active campaigns.
Exploit Status
EPSS
0.33% (56% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2020-37214 is to upgrade Voyager CMS to version 1.3.1 or later, which includes the necessary fix. If an immediate upgrade is not feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious path manipulations in the asset parameter. Restrict file system access permissions to the Voyager CMS installation directory to limit the potential damage from a successful exploit. Monitor access logs for unusual file access patterns, particularly requests targeting sensitive files.
Actualice Voyager a la versión 1.3.1 o superior para mitigar la vulnerabilidad de recorrido de directorios. Esta actualización corrige la forma en que se manejan las rutas de los activos, evitando el acceso no autorizado a archivos sensibles del sistema.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2020-37214 is a directory traversal vulnerability in Voyager CMS versions 1.3.0 and below, allowing attackers to read sensitive files by manipulating the asset path parameter.
Yes, if you are running Voyager CMS version 1.3.0 or earlier, you are affected by this vulnerability.
Upgrade Voyager CMS to version 1.3.1 or later to remediate the vulnerability. Consider WAF rules as a temporary workaround.
Public proof-of-concept exploits are available, suggesting potential for active exploitation. Monitor your systems for suspicious activity.
Refer to the Voyager CMS official website and security advisories for the latest information and updates regarding CVE-2020-37214.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your composer.lock file and we'll tell you instantly if you're affected.