Skip to main content

CVE-2025-10233: Path Traversal in kalcaddle kodbox

Medium
VulnerabilityCVE-2025-10233cvecve-2025-10233
Published: Wed Sep 10 2025 (09/10/2025, 23:02:05 UTC)
Source: CVE Database V5
Vendor/Project: kalcaddle
Product: kodbox

Description

A security vulnerability has been detected in kalcaddle kodbox 1.61. This affects the function fileGet/fileSave of the file app/controller/explorer/editor.class.php. The manipulation of the argument path leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/10/2025, 23:30:34 UTC

Technical Analysis

CVE-2025-10233 is a medium-severity path traversal vulnerability identified in kalcaddle kodbox version 1.61, specifically affecting the fileGet and fileSave functions within the file app/controller/explorer/editor.class.php. The vulnerability arises from improper validation or sanitization of the 'path' argument, which allows an attacker to manipulate the file path parameter to access files and directories outside the intended scope. This can lead to unauthorized reading or writing of arbitrary files on the server hosting kodbox. The attack vector is remote and does not require user interaction, but it does require low privileges (PR:L) on the system, indicating that some level of authentication or access is needed to exploit the vulnerability. The CVSS 4.0 score is 5.3, reflecting a medium impact on confidentiality, integrity, and availability, with low complexity and no user interaction required. The vendor was notified but has not responded or released a patch, and while no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation. Kodbox is a web-based file management system used for collaborative file sharing and editing, often deployed in enterprise and organizational environments. The path traversal vulnerability could allow attackers to access sensitive configuration files, source code, or other critical data, potentially leading to further compromise or data leakage.

Potential Impact

For European organizations using kodbox 1.61, this vulnerability poses a risk of unauthorized data exposure and potential data integrity violations. Attackers exploiting this flaw could read or modify sensitive files, which may include credentials, configuration files, or business-critical documents. This could lead to data breaches, disruption of services, or facilitate lateral movement within the network. Given that kodbox is used for file management and collaboration, the confidentiality and integrity of shared files are at risk. The lack of vendor response and patch availability increases the window of exposure. Organizations in sectors with strict data protection regulations, such as GDPR, face compliance risks if sensitive personal or corporate data is compromised. Additionally, the vulnerability could be leveraged as a foothold for further attacks, including ransomware or espionage, especially if attackers gain access to internal network resources through compromised kodbox instances.

Mitigation Recommendations

European organizations should immediately audit their environments to identify any deployments of kodbox version 1.61. Since no official patch is available, mitigation should focus on restricting access to the kodbox application to trusted users and networks only, using network segmentation and firewall rules. Implement strict access controls and monitor logs for unusual file access patterns or attempts to manipulate file paths. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the vulnerable functions. If feasible, consider temporarily disabling the fileGet and fileSave functionalities or restricting their usage until a patch is released. Organizations should also consider deploying intrusion detection systems (IDS) to alert on suspicious activity related to kodbox. Regular backups of critical data should be maintained to mitigate the impact of potential data tampering. Finally, maintain communication with the vendor for updates and be prepared to apply patches or upgrade to a secure version once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-10T13:42:42.775Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c206a012193b50d3015877

Added to database: 9/10/2025, 11:15:44 PM

Last enriched: 9/10/2025, 11:30:34 PM

Last updated: 9/11/2025, 12:20:13 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats