Security for everyone

CVE-2020-27467 Scanner

Detects 'Directory Traversal' vulnerability in Processwire CMS affects v. before 2.7.1.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Processwire CMS is a popular open-source content management system used by website developers for building dynamic and functional websites. This CMS offers flexible and powerful features that allow the creation of websites with customized and easy-to-use interfaces. With its modular architecture and template-driven approach, developers can create websites that are both scalable and user-friendly. 

CVE-2020-27467 is a critical vulnerability that has been detected in Processwire CMS before version 2.7.1. This vulnerability is commonly known as a Directory Traversal, as it enables attackers to access unauthorized files on servers. The vulnerability was found in the download parameter of the index.php file, which does not properly filter user inputs. 

When exploited, this vulnerability can allow remote attackers to read, delete, or modify sensitive files on servers, leading to data leakage, system compromise, or unauthorized access to confidential data. Cybersecurity experts reported that hackers could also exploit this vulnerability to install malware, take control of the server, or launch other attacks against the website and its users. 

In conclusion, cybersecurity is an essential aspect of website development and management. As seen with CVE-2020-27467, even popular content management systems like Processwire CMS can have critical vulnerabilities that put websites at risk. However, thanks to platforms like, website owners and developers can easily and quickly learn about vulnerabilities in their digital assets and take the necessary precautions to protect their websites and users.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture