7.5

CVE-2026-6569

A vulnerability was identified in kodcloud KodExplorer up to 4.52. This impacts the function fileGet of the file /app/controller/share.class.php of the component fileGet Endpoint. Such manipulation of the argument fileUrl leads to improper authentication. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Herstellerkodcloud
Produkt KodExplorer
Version 4.0
Status affected
Version 4.1
Status affected
Version 4.2
Status affected
Version 4.3
Status affected
Version 4.4
Status affected
Version 4.5
Status affected
Version 4.6
Status affected
Version 4.7
Status affected
Version 4.8
Status affected
Version 4.9
Status affected
Version 4.10
Status affected
Version 4.11
Status affected
Version 4.12
Status affected
Version 4.13
Status affected
Version 4.14
Status affected
Version 4.15
Status affected
Version 4.16
Status affected
Version 4.17
Status affected
Version 4.18
Status affected
Version 4.19
Status affected
Version 4.20
Status affected
Version 4.21
Status affected
Version 4.22
Status affected
Version 4.23
Status affected
Version 4.24
Status affected
Version 4.25
Status affected
Version 4.26
Status affected
Version 4.27
Status affected
Version 4.28
Status affected
Version 4.29
Status affected
Version 4.30
Status affected
Version 4.31
Status affected
Version 4.32
Status affected
Version 4.33
Status affected
Version 4.34
Status affected
Version 4.35
Status affected
Version 4.36
Status affected
Version 4.37
Status affected
Version 4.38
Status affected
Version 4.39
Status affected
Version 4.40
Status affected
Version 4.41
Status affected
Version 4.42
Status affected
Version 4.43
Status affected
Version 4.44
Status affected
Version 4.45
Status affected
Version 4.46
Status affected
Version 4.47
Status affected
Version 4.48
Status affected
Version 4.49
Status affected
Version 4.50
Status affected
Version 4.51
Status affected
Version 4.52
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.24
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cna@vuldb.com 7.3 3.9 3.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cna@vuldb.com 6.9 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
cna@vuldb.com 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.