CVE-2026-6569
Received Received - Intake
Improper Authentication in KodExplorer fileGet Endpoint Allows Remote Access

Publication date: 2026-04-19

Last updated on: 2026-04-19

Assigner: VulDB

Description
A vulnerability was identified in kodcloud KodExplorer up to 4.52. This impacts the function fileGet of the file /app/controller/share.class.php of the component fileGet Endpoint. Such manipulation of the argument fileUrl leads to improper authentication. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-19
Last Modified
2026-04-19
Generated
2026-05-06
AI Q&A
2026-04-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kodcloud kodexplorer to 4.52 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in kodcloud KodExplorer up to version 4.52, specifically in the fileGet function of the /app/controller/share.class.php file. It involves improper authentication caused by manipulation of the fileUrl argument. An attacker can exploit this remotely to bypass authentication controls.


How can this vulnerability impact me? :

The vulnerability allows remote attackers to bypass authentication, potentially granting unauthorized access to files or data managed by KodExplorer. This can lead to exposure, modification, or deletion of sensitive information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart