Impact
A flaw in the Compression Handler of kalcaddle kodbox allows an attacker to inject malicious commands through the zip processing endpoint. The vulnerability arises from insufficient sanitization of inputs, leading to arbitrary command execution on the host. As a result, a remote attacker can run any code with the privileges of the web application, exposing the system to full compromise.
Affected Systems
The vulnerability affects kalcaddle kodbox versions up to 1.61.10. Systems running any of these versions with the Compression Handler enabled are susceptible.
Risk and Exploitability
The CVSS base score of 5.3 classifies the flaw as moderate severity. The EPSS score is below 1 %, indicating a low likelihood of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, but a public exploit is available and can be launched remotely via the /?explorer/index/zip endpoint. Attackers need only construct a crafted request; no elevated privileges or local access are required.
OpenCVE Enrichment