Impact
Kiteworks’ command execution module permits authenticated users to redirect command output to arbitrary file locations, effectively enabling overwriting of critical system files. This regression constitutes an OS command injection flaw classified as CWE‑78, allowing an attacker to alter system integrity and ultimately acquire elevated rights on the host. The vulnerability delivers a path from authentication to privilege escalation by exploiting the open file redirection capability within the command workflow.
Affected Systems
Vendors affected are Kiteworks, the private data network solution. All instances running versions prior to 9.2.0 are vulnerable; the fix is delivered in version 9.2.0 and later. No other manufacturers or product variations are listed as impacted.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity, while the EPSS value of less than 1% suggests a low probability of widespread exploitation at present. The vulnerability is not included in the CISA KEV catalog, further reducing its exploitation likelihood. Since the flaw requires valid user credentials to access the command execution functionality, attackers must first compromise or legitimately authenticate to the system. Once authenticated, they can manipulate output redirection to overwrite system files, providing a clear route to privilege escalation.
OpenCVE Enrichment