CVE-2026-6572
Received Received - Intake
Improper Authorization in Collabora KodExplorer File Upload Endpoint

Publication date: 2026-04-19

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
collabora kodexplorer to 4.52 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Collabora KodExplorer up to version 4.52, specifically in the file /app/controller/share.class.php within the fileUpload Endpoint component. It involves improper authorization caused by manipulation of the fileUpload argument. This flaw allows a remote attacker to exploit the system, although the attack is considered complex and difficult to perform.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized actions related to file uploads, potentially allowing a remote attacker to bypass authorization controls. This could result in unauthorized access or modification of files, impacting the confidentiality, integrity, and availability of the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart