Home

Description

FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability in the undocumented proxy API that allows attackers to include arbitrary client-side scripts. Attackers can exploit the 'url' GET parameter to inject malicious JavaScript and potentially hijack user sessions or manipulate page content.

PUBLISHED Reserved 2025-12-23 | Published 2026-01-06 | Updated 2026-01-06 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Inclusion of Functionality from Untrusted Control Sphere

Product status

Any version
affected

Any version
affected

Any version
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/48240 (ExploitDB-48240) exploit

www.fibaro.com (Official Vendor Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5563.php (Zero Science Lab Disclosure (ZSL-2020-5563)) third-party-advisory

packetstorm.news/files/id/156869 (Packet Storm Security Exploit Entry) exploit

cxsecurity.com/issue/WLB-2020030140 (CXSecurity Vulnerability Listing) exploit

exchange.xforce.ibmcloud.com/vulnerabilities/178269 (IBM X-Force Vulnerability Exchange) vdb-entry

www.vulncheck.com/...ter-remote-file-inclusion-via-proxy-api (VulnCheck Advisory: FIBARO System Home Center 5.021 Remote File Inclusion via Proxy API) third-party-advisory

cve.org (CVE-2020-36905)

nvd.nist.gov (CVE-2020-36905)

Download JSON