Impact
A weakness in the roleGroupAction function of kodcloud KodExplorer allows an attacker to manipulate the group_role argument to bypass normal authorization checks. This enables the attacker to execute actions that should only be available to privileged users or to modify group permissions remotely.
Affected Systems
Kodcloud KodExplorer versions up to and including 4.52 are affected. No patch or fix has been released by the vendor at this time and the vulnerability is present in all mentioned versions.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium impact. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack may be launched remotely by submitting a crafted request that includes a manipulated group_role parameter. The likely attack vector is via the web interface or an API that exposes the roleGroupAction endpoint, and the exploit has already been made publicly available.
OpenCVE Enrichment