Description
A vulnerability was determined in kodcloud KodExplorer up to 4.52. This affects the function share.class.php::initShareOld of the file /app/controller/share.class.php of the component Public Share Handler. This manipulation of the argument path causes path traversal. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path Traversal
Action: Apply Patch
AI Analysis

Impact

This vulnerability is a path traversal flaw in the Public Share Handler of kodcloud KodExplorer before version 4.52. By manipulating the path argument in share.class.php::initShareOld, an attacker can cause the server to resolve filesystem paths outside the intended directory, potentially reading sensitive files or exposing hidden directories. The flaw can be triggered over the network, meaning a remote attacker can exploit it without authentication.

Affected Systems

Affected systems include any deployment of kodcloud KodExplorer with version 4.52 or older. The issue is present in the Public Share feature and specifically targets the initShareOld function located in /app/controller/share.class.php. No specific operating system was mentioned, so the flaw applies to all platforms where KodExplorer is installed.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate risk, allowing remote exploitation with potential for information disclosure. EPSS is not available, but the public disclosure and lack of vendor response suggest the vulnerability may be actively used. Without a KEV listing, the threat is not yet catalogued by CISA, but the remote nature and path traversal severity merit immediate attention. An attacker could exploit this flaw by sending a crafted request containing directory traversal sequences, bypassing intended access controls and reading arbitrary files on the server.

Generated by OpenCVE AI on April 19, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest KodExplorer release that addresses the path traversal vulnerability (currently version 4.53 or later).
  • If an update is unavailable, secure the Public Share endpoint by restricting it to trusted IP ranges or disabling the feature entirely.
  • Validate all user‑supplied path parameters on the server side, restricting them to allowable directory prefixes and rejecting any traversal sequences.

Generated by OpenCVE AI on April 19, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 19 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in kodcloud KodExplorer up to 4.52. This affects the function share.class.php::initShareOld of the file /app/controller/share.class.php of the component Public Share Handler. This manipulation of the argument path causes path traversal. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title kodcloud KodExplorer Public Share share.class.php initShareOld path traversal
First Time appeared Kodcloud
Kodcloud kodexplorer
Weaknesses CWE-22
CPEs cpe:2.3:a:kodcloud:kodexplorer:*:*:*:*:*:*:*:*
Vendors & Products Kodcloud
Kodcloud kodexplorer
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Kodcloud Kodexplorer
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-19T09:45:11.131Z

Reserved: 2026-04-18T19:06:53.371Z

Link: CVE-2026-6568

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-19T10:16:09.203

Modified: 2026-04-19T10:16:09.203

Link: CVE-2026-6568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-19T14:15:06Z

Weaknesses