{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6569","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-18T19:06:56.726Z","datePublished":"2026-04-19T10:15:11.445Z","dateUpdated":"2026-04-20T14:55:28.674Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-19T10:15:11.445Z"},"title":"kodcloud KodExplorer fileGet Endpoint share.class.php improper authentication","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-287","lang":"en","description":"Improper Authentication"}]}],"affected":[{"vendor":"kodcloud","product":"KodExplorer","versions":[{"version":"4.0","status":"affected"},{"version":"4.1","status":"affected"},{"version":"4.2","status":"affected"},{"version":"4.3","status":"affected"},{"version":"4.4","status":"affected"},{"version":"4.5","status":"affected"},{"version":"4.6","status":"affected"},{"version":"4.7","status":"affected"},{"version":"4.8","status":"affected"},{"version":"4.9","status":"affected"},{"version":"4.10","status":"affected"},{"version":"4.11","status":"affected"},{"version":"4.12","status":"affected"},{"version":"4.13","status":"affected"},{"version":"4.14","status":"affected"},{"version":"4.15","status":"affected"},{"version":"4.16","status":"affected"},{"version":"4.17","status":"affected"},{"version":"4.18","status":"affected"},{"version":"4.19","status":"affected"},{"version":"4.20","status":"affected"},{"version":"4.21","status":"affected"},{"version":"4.22","status":"affected"},{"version":"4.23","status":"affected"},{"version":"4.24","status":"affected"},{"version":"4.25","status":"affected"},{"version":"4.26","status":"affected"},{"version":"4.27","status":"affected"},{"version":"4.28","status":"affected"},{"version":"4.29","status":"affected"},{"version":"4.30","status":"affected"},{"version":"4.31","status":"affected"},{"version":"4.32","status":"affected"},{"version":"4.33","status":"affected"},{"version":"4.34","status":"affected"},{"version":"4.35","status":"affected"},{"version":"4.36","status":"affected"},{"version":"4.37","status":"affected"},{"version":"4.38","status":"affected"},{"version":"4.39","status":"affected"},{"version":"4.40","status":"affected"},{"version":"4.41","status":"affected"},{"version":"4.42","status":"affected"},{"version":"4.43","status":"affected"},{"version":"4.44","status":"affected"},{"version":"4.45","status":"affected"},{"version":"4.46","status":"affected"},{"version":"4.47","status":"affected"},{"version":"4.48","status":"affected"},{"version":"4.49","status":"affected"},{"version":"4.50","status":"affected"},{"version":"4.51","status":"affected"},{"version":"4.52","status":"affected"}],"cpes":["cpe:2.3:a:kodcloud:kodexplorer:*:*:*:*:*:*:*:*"],"modules":["fileGet Endpoint"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in kodcloud KodExplorer up to 4.52. This impacts the function fileGet of the file /app/controller/share.class.php of the component fileGet Endpoint. Such manipulation of the argument fileUrl leads to improper authentication. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:ND/RC:ND"}}],"timeline":[{"time":"2026-04-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-18T21:12:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"vulnplusbot (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/358203","name":"VDB-358203 | kodcloud KodExplorer fileGet Endpoint share.class.php improper authentication","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/358203/cti","name":"VDB-358203 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/789982","name":"Submit #789982 | KodExplorer 4.52 SSRF","tags":["third-party-advisory"]},{"url":"https://vulnplus-note.wetolink.com/share/wgfZR6kXRApl","tags":["broken-link"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-20T14:53:09.075200Z","id":"CVE-2026-6569","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-20T14:55:28.674Z"}}]}}