{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6571","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-18T19:07:03.225Z","datePublished":"2026-04-19T12:00:17.810Z","dateUpdated":"2026-04-20T14:18:17.474Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-19T12:00:17.810Z"},"title":"kodcloud KodExplorer systemRole.class.php roleGroupAction authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-639","lang":"en","description":"Authorization Bypass"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]}],"affected":[{"vendor":"kodcloud","product":"KodExplorer","versions":[{"version":"4.0","status":"affected"},{"version":"4.1","status":"affected"},{"version":"4.2","status":"affected"},{"version":"4.3","status":"affected"},{"version":"4.4","status":"affected"},{"version":"4.5","status":"affected"},{"version":"4.6","status":"affected"},{"version":"4.7","status":"affected"},{"version":"4.8","status":"affected"},{"version":"4.9","status":"affected"},{"version":"4.10","status":"affected"},{"version":"4.11","status":"affected"},{"version":"4.12","status":"affected"},{"version":"4.13","status":"affected"},{"version":"4.14","status":"affected"},{"version":"4.15","status":"affected"},{"version":"4.16","status":"affected"},{"version":"4.17","status":"affected"},{"version":"4.18","status":"affected"},{"version":"4.19","status":"affected"},{"version":"4.20","status":"affected"},{"version":"4.21","status":"affected"},{"version":"4.22","status":"affected"},{"version":"4.23","status":"affected"},{"version":"4.24","status":"affected"},{"version":"4.25","status":"affected"},{"version":"4.26","status":"affected"},{"version":"4.27","status":"affected"},{"version":"4.28","status":"affected"},{"version":"4.29","status":"affected"},{"version":"4.30","status":"affected"},{"version":"4.31","status":"affected"},{"version":"4.32","status":"affected"},{"version":"4.33","status":"affected"},{"version":"4.34","status":"affected"},{"version":"4.35","status":"affected"},{"version":"4.36","status":"affected"},{"version":"4.37","status":"affected"},{"version":"4.38","status":"affected"},{"version":"4.39","status":"affected"},{"version":"4.40","status":"affected"},{"version":"4.41","status":"affected"},{"version":"4.42","status":"affected"},{"version":"4.43","status":"affected"},{"version":"4.44","status":"affected"},{"version":"4.45","status":"affected"},{"version":"4.46","status":"affected"},{"version":"4.47","status":"affected"},{"version":"4.48","status":"affected"},{"version":"4.49","status":"affected"},{"version":"4.50","status":"affected"},{"version":"4.51","status":"affected"},{"version":"4.52","status":"affected"}],"cpes":["cpe:2.3:a:kodcloud:kodexplorer:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in kodcloud KodExplorer up to 4.52. Affected by this vulnerability is the function roleGroupAction of the file /app/controller/systemRole.class.php. Executing a manipulation of the argument group_role can lead to authorization bypass. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-18T21:12:40.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"vulnplusbot (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/358205","name":"VDB-358205 | kodcloud KodExplorer systemRole.class.php roleGroupAction authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/358205/cti","name":"VDB-358205 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/789987","name":"Submit #789987 | KodExplorer 4.52 Authorization Bypass","tags":["third-party-advisory"]},{"url":"https://vulnplus-note.wetolink.com/share/atu3UbqnfAgs","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-20T14:18:02.072581Z","id":"CVE-2026-6571","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-20T14:18:17.474Z"}}]}}