Description
A security flaw has been discovered in kalcaddle kodbox 1.64. Impacted is the function can of the file /workspace/source-code/app/controller/explorer/auth.class.php of the component Password-protected Share Handler. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-26
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authentication enabling unauthorized access
Action: Patch ASAP
AI Analysis

Impact

A flaw in the Password‑Protected Share Handler of kalcaddle kodbox allows an attacker to bypass authentication in the auth.class.php controller. By manipulating the request, an unauthorized user can gain access to protected resources and view or download data that should be restricted. This unauthorized access is a direct result of an authentication failure (CWE-287).

Affected Systems

The vulnerability affects kalcaddle kodbox version 1.64. No other vendors or products are listed as impacted.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity, and the absence of an EPSS entry combined with the fact that it is not listed in CISA's Known Exploited Vulnerabilities catalog suggests limited widespread exploitation so far. However, a public exploit has been released and the attack can be performed remotely. The complexity is high and the exploitability is considered difficult, yet an attacker with sufficient skill can forge a request that bypasses the authentication check and gain unauthorized access.

Generated by OpenCVE AI on March 26, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available patch from kalcaddle for version 1.64 as soon as it is released.
  • If a patch is not yet available, disable the Password‑Protected Share Handler or remove the auth class from the publicly exposed web root until a fix isRestrict external access to the kodbox installation with firewall rules or network segmentation so that only trusted hosts can reach the vulnerable endpoint.
  • Implement an additional authentication layer, such as multi‑factor authentication, around the protected resource area.
  • Monitor access logs for repeated failed or suspicious login attempts and alert on potential exploitation attempts.

Generated by OpenCVE AI on March 26, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Kalcaddle
Kalcaddle kodbox
Vendors & Products Kalcaddle
Kalcaddle kodbox

Thu, 26 Mar 2026 01:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in kalcaddle kodbox 1.64. Impacted is the function can of the file /workspace/source-code/app/controller/explorer/auth.class.php of the component Password-protected Share Handler. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title kalcaddle kodbox Password-protected Share auth.class.php can improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Kalcaddle Kodbox
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T14:16:51.497Z

Reserved: 2026-03-25T14:11:38.305Z

Link: CVE-2026-4831

cve-icon Vulnrichment

Updated: 2026-03-26T14:16:47.935Z

cve-icon NVD

Status : Deferred

Published: 2026-03-26T02:16:08.113

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-4831

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:08:53Z

Weaknesses