Description
A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-19
Score: 6.3 Medium
EPSS: n/a
KEV: No
Impact: Unauthorized Access via Improper Authorization
Action: Assess Impact
AI Analysis

Impact

A security flaw in Collabora KodExplorer, discovered in the file /app/controller/share.class.php on the fileUpload Endpoint, allows an attacker to manipulate the fileUpload argument and bypass authorization checks. This improper authorization can lead to remote exploitation, enabling an attacker to gain unauthorized access to functionality or data that should otherwise be protected. The vulnerability is classified as having a high attack complexity and is noted to be difficult to exploit, but the fact that remote exploitation is possible raises significant concern.

Affected Systems

Collabora KodExplorer versions up to 4.52 are potentially affected. All deployments of KodExplorer relying on the share.class.php based fileUpload Endpoint in these versions are at risk until the flaw is remediated.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity, and the EPSS score is currently unavailable, which does not provide a clear picture of exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog. Remote attackers could exploit the flaw by sending crafted requests to the fileUpload Endpoint, although the high attack complexity and difficulty suggest that it would not be trivially abused. Nevertheless, the potential for unauthorized access warrants prompt attention.

Generated by OpenCVE AI on April 19, 2026 at 13:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a version newer than 4.52 that contains the fix for the improper authorization issue in the fileUpload Endpoint.
  • If an immediate update is not feasible, restrict access to the fileUpload Endpoint at the web‑server or firewall level so that only trusted IP ranges or authenticated sessions can reach it.
  • Conduct an access‑control review for the share.class.php controller, ensuring that proper role checks are enforced, and monitor logs for any anomalous fileUpload requests.

Generated by OpenCVE AI on April 19, 2026 at 13:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 19 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 5.1, 'vector': 'AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.6, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-19T12:15:14.167Z

Reserved: 2026-04-18T19:07:07.145Z

Link: CVE-2026-6572

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-19T13:16:45.650

Modified: 2026-04-19T13:16:45.650

Link: CVE-2026-6572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-19T13:30:27Z

Weaknesses