{ "dataType": "CVE_RECORD", "dataVersion": "5.2", "cveMetadata": { "cveId": "CVE-2026-6568", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "state": "PUBLISHED", "assignerShortName": "VulDB", "dateReserved": "2026-04-18T19:06:53.371Z", "datePublished": "2026-04-19T09:45:11.131Z", "dateUpdated": "2026-04-19T09:45:11.131Z" }, "containers": { "cna": { "providerMetadata": { "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB", "dateUpdated": "2026-04-19T09:45:11.131Z" }, "title": "kodcloud KodExplorer Public Share share.class.php initShareOld path traversal", "problemTypes": [ { "descriptions": [ { "type": "CWE", "cweId": "CWE-22", "lang": "en", "description": "Path Traversal" } ] } ], "affected": [ { "vendor": "kodcloud", "product": "KodExplorer", "versions": [ { "version": "4.0", "status": "affected" }, { "version": "4.1", "status": "affected" }, { "version": "4.2", "status": "affected" }, { "version": "4.3", "status": "affected" }, { "version": "4.4", "status": "affected" }, { "version": "4.5", "status": "affected" }, { "version": "4.6", "status": "affected" }, { "version": "4.7", "status": "affected" }, { "version": "4.8", "status": "affected" }, { "version": "4.9", "status": "affected" }, { "version": "4.10", "status": "affected" }, { "version": "4.11", "status": "affected" }, { "version": "4.12", "status": "affected" }, { "version": "4.13", "status": "affected" }, { "version": "4.14", "status": "affected" }, { "version": "4.15", "status": "affected" }, { "version": "4.16", "status": "affected" }, { "version": "4.17", "status": "affected" }, { "version": "4.18", "status": "affected" }, { "version": "4.19", "status": "affected" }, { "version": "4.20", "status": "affected" }, { "version": "4.21", "status": "affected" }, { "version": "4.22", "status": "affected" }, { "version": "4.23", "status": "affected" }, { "version": "4.24", "status": "affected" }, { "version": "4.25", "status": "affected" }, { "version": "4.26", "status": "affected" }, { "version": "4.27", "status": "affected" }, { "version": "4.28", "status": "affected" }, { "version": "4.29", "status": "affected" }, { "version": "4.30", "status": "affected" }, { "version": "4.31", "status": "affected" }, { "version": "4.32", "status": "affected" }, { "version": "4.33", "status": "affected" }, { "version": "4.34", "status": "affected" }, { "version": "4.35", "status": "affected" }, { "version": "4.36", "status": "affected" }, { "version": "4.37", "status": "affected" }, { "version": "4.38", "status": "affected" }, { "version": "4.39", "status": "affected" }, { "version": "4.40", "status": "affected" }, { "version": "4.41", "status": "affected" }, { "version": "4.42", "status": "affected" }, { "version": "4.43", "status": "affected" }, { "version": "4.44", "status": "affected" }, { "version": "4.45", "status": "affected" }, { "version": "4.46", "status": "affected" }, { "version": "4.47", "status": "affected" }, { "version": "4.48", "status": "affected" }, { "version": "4.49", "status": "affected" }, { "version": "4.50", "status": "affected" }, { "version": "4.51", "status": "affected" }, { "version": "4.52", "status": "affected" } ], "cpes": [ "cpe:2.3:a:kodcloud:kodexplorer:*:*:*:*:*:*:*:*" ], "modules": [ "Public Share Handler" ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was determined in kodcloud KodExplorer up to 4.52. This affects the function share.class.php::initShareOld of the file /app/controller/share.class.php of the component Public Share Handler. This manipulation of the argument path causes path traversal. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way." } ], "metrics": [ { "cvssV4_0": { "version": "4.0", "baseScore": 6.9, "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "baseSeverity": "MEDIUM" } }, { "cvssV3_1": { "version": "3.1", "baseScore": 7.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "baseSeverity": "HIGH" } }, { "cvssV3_0": { "version": "3.0", "baseScore": 7.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "baseSeverity": "HIGH" } }, { "cvssV2_0": { "version": "2.0", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR" } } ], "timeline": [ { "time": "2026-04-18T00:00:00.000Z", "lang": "en", "value": "Advisory disclosed" }, { "time": "2026-04-18T02:00:00.000Z", "lang": "en", "value": "VulDB entry created" }, { "time": "2026-04-18T21:12:12.000Z", "lang": "en", "value": "VulDB entry last update" } ], "credits": [ { "lang": "en", "value": "vulnplusbot (VulDB User)", "type": "reporter" }, { "lang": "en", "value": "VulDB CNA Team", "type": "coordinator" } ], "references": [ { "url": "https://vuldb.com/vuln/358202", "name": "VDB-358202 | kodcloud KodExplorer Public Share share.class.php initShareOld path traversal", "tags": [ "vdb-entry", "technical-description" ] }, { "url": "https://vuldb.com/vuln/358202/cti", "name": "VDB-358202 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ] }, { "url": "https://vuldb.com/submit/789981", "name": "Submit #789981 | KodExplorer 4.52 Path Traversal", "tags": [ "third-party-advisory" ] }, { "url": "https://vulnplus-note.wetolink.com/share/JyHBnRUaoOY2", "tags": [ "broken-link", "exploit" ] } ] } } }