Home

Description

Syncplify.me Server! 5.0.37 contains an unquoted service path vulnerability in the SMWebRestServicev5 service that allows local attackers to escalate privileges by exploiting the unquoted binary path. Attackers can insert a malicious executable into the service path and execute it with LocalSystem privileges when the service restarts or the system reboots.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unquoted Search Path or Element

Product status

5.0.37
affected

Credits

Julio Aviña finder

References

www.exploit-db.com/exploits/49009 (ExploitDB-49009) exploit

www.syncplify.me/ (Official Product Homepage) product

download.syncplify.me/SMServer_Setup.exe (Product Reference) product

www.vulncheck.com/...uoted-service-path-privilege-escalation (VulnCheck Advisory: Syncplify.me Server! 5.0.37 Unquoted Service Path Privilege Escalation) third-party-advisory

cve.org (CVE-2020-37230)

nvd.nist.gov (CVE-2020-37230)

Download JSON