Impact
The PathDriverUrl function in the editor.class.php endpoint of kalcaddle kodbox 1.64 allows attackers to supply arbitrary path values, causing the server to make outbound HTTP requests. The flaw can be used for server‑side request forgery (SSRF) and can be exploited remotely. Public exploits have been released, allowing attackers to potentially target internal resources.
Affected Systems
The affected product is kalcaddle kodbox, specifically version 1.64. No other versions are listed. Administrators of installations running this version should verify whether they expose the editor.class.php PathDriverUrl endpoint to external users.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. The EPSS score of 0.00038 indicates a very low exploitation probability, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack may be launched remotely, and public exploits are available. The vulnerability is likely to be exploitable by attackers with network access to the affected web application.
OpenCVE Enrichment