{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9414","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-25T09:05:18.132Z","datePublished":"2025-08-25T18:32:07.112Z","dateUpdated":"2025-08-25T19:00:18.358Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-25T18:32:07.112Z"},"title":"kalcaddle kodbox Download from Link serverDownload server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"kalcaddle","product":"kodbox","versions":[{"version":"1.61","status":"affected"}],"modules":["Download from Link Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in kalcaddle kodbox 1.61. Affected by this vulnerability is an unknown functionality of the file /?explorer/upload/serverDownload of the component Download from Link Handler. Performing manipulation of the argument url results in server-side request forgery. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in kalcaddle kodbox 1.61 gefunden. Es geht um eine nicht näher bekannte Funktion der Datei /?explorer/upload/serverDownload der Komponente Download from Link Handler. Die Veränderung des Parameters url resultiert in server-side request forgery. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-25T11:10:21.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"AquaNight (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.321256","name":"VDB-321256 | kalcaddle kodbox Download from Link serverDownload server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.321256","name":"VDB-321256 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.633727","name":"Submit #633727 | KodCloud KodBox v1.61 Server-Side Request Forgery","tags":["third-party-advisory"]},{"url":"https://gist.github.com/SysEternals/a03d45b582451f243f9c24076593c49c","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-25T18:52:54.972034Z","id":"CVE-2025-9414","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-25T19:00:18.358Z"}}]}}