CVE-2026-6570
Received Received - Intake
Authorization Bypass in KodExplorer initInstall Allows Remote Exploit

Publication date: 2026-04-19

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in kodcloud KodExplorer up to 4.52. Affected is the function initInstall of the file /app/controller/systemMember.class.php. Performing a manipulation of the argument path results in authorization bypass. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kodcloud kodexplorer to 4.52 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in kodcloud KodExplorer up to version 4.52, specifically in the initInstall function of the file /app/controller/systemMember.class.php.

An attacker can manipulate the argument 'path' to bypass authorization controls, allowing unauthorized access or actions.

The attack can be performed remotely, and the exploit code has been publicly released.

The vendor was informed early but did not respond.


How can this vulnerability impact me? :

This vulnerability allows an attacker to bypass authorization mechanisms remotely.

As a result, unauthorized users may gain access to restricted functions or data within the affected KodExplorer installation.

Since the exploit is publicly available, the risk of attacks exploiting this flaw is increased.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart