Impact
A flaw in the fileGet function of the KodExplorer component permits manipulation of the fileUrl parameter to bypass authentication checks, enabling an attacker to retrieve files without proper authorization. The weakness is identified as an authentication bypass (CWE‑287) and can compromise the confidentiality of sensitive content stored on the affected system.
Affected Systems
The vulnerability affects the kodcloud KodExplorer product, specifically versions up to and including 4.52. Consequently any instance of KodExplorer within this version range susceptible to the fileGet endpoint is impacted.
Risk and Exploitability
The CVSS score of 6.9 places the issue in the medium severity range; however the lack of an EPSS score or KEV listing does not diminish the potential for exploitation. The description confirms that the attack can be launched remotely, and the absence of a vendor response suggests no immediate mitigation is in place. Attackers could remotely send crafted requests to the fileGet endpoint to retrieve arbitrary files, thereby potentially exposing internal data and breaching confidentiality. The risk is higher for deployments that expose the endpoint to untrusted networks and where authentication controls are not enforced externally.
OpenCVE Enrichment