Skip to content

Commit 6bafbec

Browse files
author
cvelistV5 Github Action
committed
1 changes (1 new | 0 updated):
- 1 new CVEs: CVE-2026-6572 - 0 updated CVEs:
1 parent c2228d3 commit 6bafbec

3 files changed

Lines changed: 387 additions & 31 deletions

File tree

cves/2026/6xxx/CVE-2026-6572.json

Lines changed: 368 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,368 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.2",
4+
"cveMetadata": {
5+
"cveId": "CVE-2026-6572",
6+
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
7+
"state": "PUBLISHED",
8+
"assignerShortName": "VulDB",
9+
"dateReserved": "2026-04-18T19:07:07.145Z",
10+
"datePublished": "2026-04-19T12:15:14.167Z",
11+
"dateUpdated": "2026-04-19T12:15:14.167Z"
12+
},
13+
"containers": {
14+
"cna": {
15+
"providerMetadata": {
16+
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
17+
"shortName": "VulDB",
18+
"dateUpdated": "2026-04-19T12:15:14.167Z"
19+
},
20+
"title": "Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization",
21+
"problemTypes": [
22+
{
23+
"descriptions": [
24+
{
25+
"type": "CWE",
26+
"cweId": "CWE-285",
27+
"lang": "en",
28+
"description": "Improper Authorization"
29+
}
30+
]
31+
},
32+
{
33+
"descriptions": [
34+
{
35+
"type": "CWE",
36+
"cweId": "CWE-266",
37+
"lang": "en",
38+
"description": "Incorrect Privilege Assignment"
39+
}
40+
]
41+
}
42+
],
43+
"affected": [
44+
{
45+
"vendor": "Collabora",
46+
"product": "KodExplorer",
47+
"versions": [
48+
{
49+
"version": "4.0",
50+
"status": "affected"
51+
},
52+
{
53+
"version": "4.1",
54+
"status": "affected"
55+
},
56+
{
57+
"version": "4.2",
58+
"status": "affected"
59+
},
60+
{
61+
"version": "4.3",
62+
"status": "affected"
63+
},
64+
{
65+
"version": "4.4",
66+
"status": "affected"
67+
},
68+
{
69+
"version": "4.5",
70+
"status": "affected"
71+
},
72+
{
73+
"version": "4.6",
74+
"status": "affected"
75+
},
76+
{
77+
"version": "4.7",
78+
"status": "affected"
79+
},
80+
{
81+
"version": "4.8",
82+
"status": "affected"
83+
},
84+
{
85+
"version": "4.9",
86+
"status": "affected"
87+
},
88+
{
89+
"version": "4.10",
90+
"status": "affected"
91+
},
92+
{
93+
"version": "4.11",
94+
"status": "affected"
95+
},
96+
{
97+
"version": "4.12",
98+
"status": "affected"
99+
},
100+
{
101+
"version": "4.13",
102+
"status": "affected"
103+
},
104+
{
105+
"version": "4.14",
106+
"status": "affected"
107+
},
108+
{
109+
"version": "4.15",
110+
"status": "affected"
111+
},
112+
{
113+
"version": "4.16",
114+
"status": "affected"
115+
},
116+
{
117+
"version": "4.17",
118+
"status": "affected"
119+
},
120+
{
121+
"version": "4.18",
122+
"status": "affected"
123+
},
124+
{
125+
"version": "4.19",
126+
"status": "affected"
127+
},
128+
{
129+
"version": "4.20",
130+
"status": "affected"
131+
},
132+
{
133+
"version": "4.21",
134+
"status": "affected"
135+
},
136+
{
137+
"version": "4.22",
138+
"status": "affected"
139+
},
140+
{
141+
"version": "4.23",
142+
"status": "affected"
143+
},
144+
{
145+
"version": "4.24",
146+
"status": "affected"
147+
},
148+
{
149+
"version": "4.25",
150+
"status": "affected"
151+
},
152+
{
153+
"version": "4.26",
154+
"status": "affected"
155+
},
156+
{
157+
"version": "4.27",
158+
"status": "affected"
159+
},
160+
{
161+
"version": "4.28",
162+
"status": "affected"
163+
},
164+
{
165+
"version": "4.29",
166+
"status": "affected"
167+
},
168+
{
169+
"version": "4.30",
170+
"status": "affected"
171+
},
172+
{
173+
"version": "4.31",
174+
"status": "affected"
175+
},
176+
{
177+
"version": "4.32",
178+
"status": "affected"
179+
},
180+
{
181+
"version": "4.33",
182+
"status": "affected"
183+
},
184+
{
185+
"version": "4.34",
186+
"status": "affected"
187+
},
188+
{
189+
"version": "4.35",
190+
"status": "affected"
191+
},
192+
{
193+
"version": "4.36",
194+
"status": "affected"
195+
},
196+
{
197+
"version": "4.37",
198+
"status": "affected"
199+
},
200+
{
201+
"version": "4.38",
202+
"status": "affected"
203+
},
204+
{
205+
"version": "4.39",
206+
"status": "affected"
207+
},
208+
{
209+
"version": "4.40",
210+
"status": "affected"
211+
},
212+
{
213+
"version": "4.41",
214+
"status": "affected"
215+
},
216+
{
217+
"version": "4.42",
218+
"status": "affected"
219+
},
220+
{
221+
"version": "4.43",
222+
"status": "affected"
223+
},
224+
{
225+
"version": "4.44",
226+
"status": "affected"
227+
},
228+
{
229+
"version": "4.45",
230+
"status": "affected"
231+
},
232+
{
233+
"version": "4.46",
234+
"status": "affected"
235+
},
236+
{
237+
"version": "4.47",
238+
"status": "affected"
239+
},
240+
{
241+
"version": "4.48",
242+
"status": "affected"
243+
},
244+
{
245+
"version": "4.49",
246+
"status": "affected"
247+
},
248+
{
249+
"version": "4.50",
250+
"status": "affected"
251+
},
252+
{
253+
"version": "4.51",
254+
"status": "affected"
255+
},
256+
{
257+
"version": "4.52",
258+
"status": "affected"
259+
}
260+
],
261+
"modules": [
262+
"fileUpload Endpoint"
263+
]
264+
}
265+
],
266+
"descriptions": [
267+
{
268+
"lang": "en",
269+
"value": "A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
270+
}
271+
],
272+
"metrics": [
273+
{
274+
"cvssV4_0": {
275+
"version": "4.0",
276+
"baseScore": 6.3,
277+
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
278+
"baseSeverity": "MEDIUM"
279+
}
280+
},
281+
{
282+
"cvssV3_1": {
283+
"version": "3.1",
284+
"baseScore": 5.6,
285+
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
286+
"baseSeverity": "MEDIUM"
287+
}
288+
},
289+
{
290+
"cvssV3_0": {
291+
"version": "3.0",
292+
"baseScore": 5.6,
293+
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
294+
"baseSeverity": "MEDIUM"
295+
}
296+
},
297+
{
298+
"cvssV2_0": {
299+
"version": "2.0",
300+
"baseScore": 5.1,
301+
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"
302+
}
303+
}
304+
],
305+
"timeline": [
306+
{
307+
"time": "2026-04-18T00:00:00.000Z",
308+
"lang": "en",
309+
"value": "Advisory disclosed"
310+
},
311+
{
312+
"time": "2026-04-18T02:00:00.000Z",
313+
"lang": "en",
314+
"value": "VulDB entry created"
315+
},
316+
{
317+
"time": "2026-04-18T21:12:43.000Z",
318+
"lang": "en",
319+
"value": "VulDB entry last update"
320+
}
321+
],
322+
"credits": [
323+
{
324+
"lang": "en",
325+
"value": "vulnplusbot (VulDB User)",
326+
"type": "reporter"
327+
},
328+
{
329+
"lang": "en",
330+
"value": "VulDB CNA Team",
331+
"type": "coordinator"
332+
}
333+
],
334+
"references": [
335+
{
336+
"url": "https://vuldb.com/vuln/358206",
337+
"name": "VDB-358206 | Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization",
338+
"tags": [
339+
"vdb-entry",
340+
"technical-description"
341+
]
342+
},
343+
{
344+
"url": "https://vuldb.com/vuln/358206/cti",
345+
"name": "VDB-358206 | CTI Indicators (IOB, IOC, TTP, IOA)",
346+
"tags": [
347+
"signature",
348+
"permissions-required"
349+
]
350+
},
351+
{
352+
"url": "https://vuldb.com/submit/789988",
353+
"name": "Submit #789988 | KodExplorer 4.52 Business Logic Bypass",
354+
"tags": [
355+
"third-party-advisory"
356+
]
357+
},
358+
{
359+
"url": "https://vulnplus-note.wetolink.com/share/PLCI4v0BWaF8",
360+
"tags": [
361+
"broken-link",
362+
"exploit"
363+
]
364+
}
365+
]
366+
}
367+
}
368+
}

cves/delta.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
2-
"fetchTime": "2026-04-19T12:02:57.867Z",
2+
"fetchTime": "2026-04-19T12:25:21.990Z",
33
"numberOfChanges": 1,
44
"new": [
55
{
6-
"cveId": "CVE-2026-6571",
7-
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2026-6571",
8-
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/6xxx/CVE-2026-6571.json",
9-
"dateUpdated": "2026-04-19T12:00:17.810Z"
6+
"cveId": "CVE-2026-6572",
7+
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2026-6572",
8+
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/6xxx/CVE-2026-6572.json",
9+
"dateUpdated": "2026-04-19T12:15:14.167Z"
1010
}
1111
],
1212
"updated": [],

0 commit comments

Comments
 (0)