Description
A vulnerability was detected in kalcaddle kodbox up to 1.61.10. This issue affects some unknown processing of the file /?explorer/index/zip of the component Compression Handler. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Patch
AI Analysis

Impact

A flaw in the Compression Handler of kalcaddle kodbox allows an attacker to inject malicious commands through the zip processing endpoint. The vulnerability arises from insufficient sanitization of inputs, leading to arbitrary command execution on the host. As a result, a remote attacker can run any code with the privileges of the web application, exposing the system to full compromise.

Affected Systems

The vulnerability affects kalcaddle kodbox versions up to 1.61.10. Systems running any of these versions with the Compression Handler enabled are susceptible.

Risk and Exploitability

The CVSS base score of 5.3 classifies the flaw as moderate severity. The EPSS score is below 1 %, indicating a low likelihood of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, but a public exploit is available and can be launched remotely via the /?explorer/index/zip endpoint. Attackers need only construct a crafted request; no elevated privileges or local access are required.

Generated by OpenCVE AI on April 18, 2026 at 05:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Limit or disable access to the Compression Handler endpoint until a vendor patch is released.
  • Restrict network traffic to the affected service using firewall rules or segmentation to prevent remote exploitation.
  • Implement input validation or sandboxing for zip extraction to prevent command injection until an official fix is applied.
  • Monitor system logs for anomalous zip extraction activity and block any suspicious requests.

Generated by OpenCVE AI on April 18, 2026 at 05:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
First Time appeared Kodcloud
Kodcloud kodbox
CPEs cpe:2.3:a:kodcloud:kodbox:*:*:*:*:*:*:*:*
Vendors & Products Kodcloud
Kodcloud kodbox

Tue, 20 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Kalcaddle
Kalcaddle kodbox
Vendors & Products Kalcaddle
Kalcaddle kodbox

Sat, 17 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in kalcaddle kodbox up to 1.61.10. This issue affects some unknown processing of the file /?explorer/index/zip of the component Compression Handler. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title kalcaddle kodbox Compression zip command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:34:40.545Z

Reserved: 2026-01-16T19:32:40.823Z

Link: CVE-2026-1066

cve-icon Vulnrichment

Updated: 2026-01-20T17:24:55.723Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-17T21:15:49.960

Modified: 2026-02-27T03:50:55.130

Link: CVE-2026-1066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:45:38Z

Weaknesses