Description
A vulnerability has been found in kalcaddle kodbox up to 1.64.05. The impacted element is the function run of the file plugins/fileThumb/lib/VideoResize.class.php of the component Media File Preview Plugin. Such manipulation of the argument localFile leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Injection
Action: Patch
AI Analysis

Impact

A vulnerability exists in the Media File Preview Plugin of kalcaddle kodbox through the VideoResize class. A crafted argument named localFile can bypass input validation and trigger arbitrary operating‑system commands. This permits an attacker to execute commands on a server hosting the plugin, compromising confidentiality, integrity, and availability of the affected system. The flaw is classified as a command‑injection weakness, identified by CWE‑77 and CWE‑78.

Affected Systems

The issue affects kalcaddle kodbox up to version 1.64.05 across all deployments that use the Media File Preview Plugin. No specific edition or environment details were provided, but any installation that includes plugins/fileThumb/lib/VideoResize.class.php is potentially vulnerable.

Risk and Exploitability

The CVSS base score of 5.3 places this vulnerability in the medium severity range. The EPSS score of less than 1% suggests a very low probability of exploitation in the general population. The vulnerability has been publicly disclosed and is not listed in CISA’s KEV catalog, meaning there are no documented mitigations. The attack can be carried out remotely by supplying a crafted localFile parameter to invoke arbitrary operating‑system commands. Successful exploitation would allow an attacker to execute commands on the server hosting the plugin, potentially compromising confidentiality, integrity, and availability of the affected system.

Generated by OpenCVE AI on April 18, 2026 at 12:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kalcaddle kodbox release that removes the insecure localFile handling in VideoResize.class.php, or patch the file to sanitize the input before executing system commands.
  • Disable the Media File Preview Plugin or remove the VideoResize component from the file system if the application does not require the preview feature.
  • Configure the webserver and PHP environment to run the plugin code with the least privileges and restrict the commands that can be executed (e.g., by using chroot, apparmor, or SELinux).

Generated by OpenCVE AI on April 18, 2026 at 12:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Kalcaddle
Kalcaddle kodbox
Vendors & Products Kalcaddle
Kalcaddle kodbox

Mon, 16 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in kalcaddle kodbox up to 1.64.05. The impacted element is the function run of the file plugins/fileThumb/lib/VideoResize.class.php of the component Media File Preview Plugin. Such manipulation of the argument localFile leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title kalcaddle kodbox Media File Preview Plugin VideoResize.class.php run os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Kalcaddle Kodbox
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:11:14.696Z

Reserved: 2026-02-15T19:07:03.869Z

Link: CVE-2026-2560

cve-icon Vulnrichment

Updated: 2026-02-17T14:58:37.070Z

cve-icon NVD

Status : Deferred

Published: 2026-02-16T14:16:18.840

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2560

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses