CVE-2020-37084
Severity CVSS v4.0:
HIGH
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
03/02/2026
Last modified:
10/02/2026
Description
School ERP Pro 1.0 contains a remote code execution vulnerability that allows authenticated admin users to upload arbitrary PHP files as profile photos by bypassing file extension checks. Attackers can exploit improper file validation in pre-editstudent.inc.php to execute arbitrary code on the server.
Impact
Base Score 4.0
8.60
Severity 4.0
HIGH
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:arox:school_erp_pro:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://web.archive.org/web/20190612111732/https://sourceforge.net/projects/school-erp-ultimate/
- https://web.archive.org/web/20200129123503/http://arox.in/
- https://www.exploit-db.com/exploits/48392
- https://www.vulncheck.com/advisories/school-erp-pro-admin-profile-photo-upload-remote-code-execution-vulnerability



