Refine your search

1 vulnerability found for KodExplorer by Collabora

CVE-2026-6572 (GCVE-0-2026-6572)
Vulnerability from cvelistv5
Published
2026-04-19 12:15
Modified
2026-04-20 16:11
CWE
  • CWE-285 - Improper Authorization
  • CWE-266 - Incorrect Privilege Assignment
Summary
A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
https://vuldb.com/vuln/358206 vdb-entry, technical-description
https://vuldb.com/vuln/358206/cti signature, permissions-required
https://vuldb.com/submit/789988 third-party-advisory
https://vulnplus-note.wetolink.com/share/PLCI4v0BWaF8 broken-link, exploit
Impacted products
Vendor Product Version
Collabora KodExplorer Version: 4.0
Version: 4.1
Version: 4.2
Version: 4.3
Version: 4.4
Version: 4.5
Version: 4.6
Version: 4.7
Version: 4.8
Version: 4.9
Version: 4.10
Version: 4.11
Version: 4.12
Version: 4.13
Version: 4.14
Version: 4.15
Version: 4.16
Version: 4.17
Version: 4.18
Version: 4.19
Version: 4.20
Version: 4.21
Version: 4.22
Version: 4.23
Version: 4.24
Version: 4.25
Version: 4.26
Version: 4.27
Version: 4.28
Version: 4.29
Version: 4.30
Version: 4.31
Version: 4.32
Version: 4.33
Version: 4.34
Version: 4.35
Version: 4.36
Version: 4.37
Version: 4.38
Version: 4.39
Version: 4.40
Version: 4.41
Version: 4.42
Version: 4.43
Version: 4.44
Version: 4.45
Version: 4.46
Version: 4.47
Version: 4.48
Version: 4.49
Version: 4.50
Version: 4.51
Version: 4.52
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-6572",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-20T16:11:11.770230Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-20T16:11:35.361Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "fileUpload Endpoint"
          ],
          "product": "KodExplorer",
          "vendor": "Collabora",
          "versions": [
            {
              "status": "affected",
              "version": "4.0"
            },
            {
              "status": "affected",
              "version": "4.1"
            },
            {
              "status": "affected",
              "version": "4.2"
            },
            {
              "status": "affected",
              "version": "4.3"
            },
            {
              "status": "affected",
              "version": "4.4"
            },
            {
              "status": "affected",
              "version": "4.5"
            },
            {
              "status": "affected",
              "version": "4.6"
            },
            {
              "status": "affected",
              "version": "4.7"
            },
            {
              "status": "affected",
              "version": "4.8"
            },
            {
              "status": "affected",
              "version": "4.9"
            },
            {
              "status": "affected",
              "version": "4.10"
            },
            {
              "status": "affected",
              "version": "4.11"
            },
            {
              "status": "affected",
              "version": "4.12"
            },
            {
              "status": "affected",
              "version": "4.13"
            },
            {
              "status": "affected",
              "version": "4.14"
            },
            {
              "status": "affected",
              "version": "4.15"
            },
            {
              "status": "affected",
              "version": "4.16"
            },
            {
              "status": "affected",
              "version": "4.17"
            },
            {
              "status": "affected",
              "version": "4.18"
            },
            {
              "status": "affected",
              "version": "4.19"
            },
            {
              "status": "affected",
              "version": "4.20"
            },
            {
              "status": "affected",
              "version": "4.21"
            },
            {
              "status": "affected",
              "version": "4.22"
            },
            {
              "status": "affected",
              "version": "4.23"
            },
            {
              "status": "affected",
              "version": "4.24"
            },
            {
              "status": "affected",
              "version": "4.25"
            },
            {
              "status": "affected",
              "version": "4.26"
            },
            {
              "status": "affected",
              "version": "4.27"
            },
            {
              "status": "affected",
              "version": "4.28"
            },
            {
              "status": "affected",
              "version": "4.29"
            },
            {
              "status": "affected",
              "version": "4.30"
            },
            {
              "status": "affected",
              "version": "4.31"
            },
            {
              "status": "affected",
              "version": "4.32"
            },
            {
              "status": "affected",
              "version": "4.33"
            },
            {
              "status": "affected",
              "version": "4.34"
            },
            {
              "status": "affected",
              "version": "4.35"
            },
            {
              "status": "affected",
              "version": "4.36"
            },
            {
              "status": "affected",
              "version": "4.37"
            },
            {
              "status": "affected",
              "version": "4.38"
            },
            {
              "status": "affected",
              "version": "4.39"
            },
            {
              "status": "affected",
              "version": "4.40"
            },
            {
              "status": "affected",
              "version": "4.41"
            },
            {
              "status": "affected",
              "version": "4.42"
            },
            {
              "status": "affected",
              "version": "4.43"
            },
            {
              "status": "affected",
              "version": "4.44"
            },
            {
              "status": "affected",
              "version": "4.45"
            },
            {
              "status": "affected",
              "version": "4.46"
            },
            {
              "status": "affected",
              "version": "4.47"
            },
            {
              "status": "affected",
              "version": "4.48"
            },
            {
              "status": "affected",
              "version": "4.49"
            },
            {
              "status": "affected",
              "version": "4.50"
            },
            {
              "status": "affected",
              "version": "4.51"
            },
            {
              "status": "affected",
              "version": "4.52"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "vulnplusbot (VulDB User)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "VulDB CNA Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack\u0027s complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 5.1,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-266",
              "description": "Incorrect Privilege Assignment",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-19T12:15:14.167Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-358206 | Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/vuln/358206"
        },
        {
          "name": "VDB-358206 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/vuln/358206/cti"
        },
        {
          "name": "Submit #789988 | KodExplorer 4.52 Business Logic Bypass",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/submit/789988"
        },
        {
          "tags": [
            "broken-link",
            "exploit"
          ],
          "url": "https://vulnplus-note.wetolink.com/share/PLCI4v0BWaF8"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-04-18T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-04-18T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-04-18T21:12:43.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2026-6572",
    "datePublished": "2026-04-19T12:15:14.167Z",
    "dateReserved": "2026-04-18T19:07:07.145Z",
    "dateUpdated": "2026-04-20T16:11:35.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}