Skip to main content

CVE-2025-9414: Server-Side Request Forgery in kalcaddle kodbox

Medium
VulnerabilityCVE-2025-9414cvecve-2025-9414
Published: Mon Aug 25 2025 (08/25/2025, 18:32:07 UTC)
Source: CVE Database V5
Vendor/Project: kalcaddle
Product: kodbox

Description

A vulnerability was found in kalcaddle kodbox 1.61. Affected by this vulnerability is an unknown functionality of the file /?explorer/upload/serverDownload of the component Download from Link Handler. Performing manipulation of the argument url results in server-side request forgery. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/25/2025, 19:02:53 UTC

Technical Analysis

CVE-2025-9414 is a Server-Side Request Forgery (SSRF) vulnerability identified in kalcaddle kodbox version 1.61, specifically within the /?explorer/upload/serverDownload endpoint of the Download from Link Handler component. SSRF vulnerabilities occur when an attacker can manipulate server-side functionality to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network restrictions. In this case, the vulnerability arises from improper validation or sanitization of the 'url' parameter, allowing an attacker to craft requests that the server will execute. This can lead to unauthorized access to internal resources, information disclosure, or further exploitation within the internal network. The vulnerability is remotely exploitable without user interaction and does not require authentication, increasing its risk profile. The CVSS 4.0 score of 5.1 (medium severity) reflects the fact that while the attack vector is network-based and requires no user interaction, it does require high privileges (PR:H) on the server, and the impact on confidentiality, integrity, and availability is limited to low. The vendor was notified but did not respond, and no patch is currently available. Although no known exploits are reported in the wild, a public exploit has been released, increasing the likelihood of exploitation. The lack of vendor response and patch availability means organizations using kodbox 1.61 remain vulnerable. Kodbox is a web-based file management system often deployed in enterprise environments for file sharing and collaboration, making this vulnerability relevant for organizations relying on it for internal or external file access.

Potential Impact

For European organizations using kodbox 1.61, this SSRF vulnerability poses a risk of unauthorized internal network access. Attackers could leverage this flaw to scan internal services, access sensitive metadata endpoints, or exploit other internal vulnerabilities not exposed externally. This could lead to data leakage, lateral movement within the network, or disruption of internal services. Given kodbox's role in file management, attackers might also attempt to access internal file servers or cloud metadata services, potentially exposing confidential documents or credentials. The medium severity rating indicates limited direct damage to confidentiality, integrity, or availability, but the SSRF could serve as a pivot point for more severe attacks. Organizations in regulated sectors such as finance, healthcare, or government in Europe must be particularly cautious, as internal data exposure could lead to compliance violations under GDPR or other data protection laws. The lack of vendor patching increases exposure time, and the public exploit availability raises the risk of opportunistic attacks. Remote exploitation without user interaction means attackers can automate attacks at scale, increasing potential impact.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. First, restrict network egress from the kodbox server to only necessary external endpoints using firewall rules or network segmentation to limit SSRF exploitation scope. Implement strict input validation and sanitization at the web application firewall (WAF) level to detect and block malicious 'url' parameter values targeting internal IP ranges or suspicious domains. Monitor server logs for unusual outbound requests originating from the kodbox server, especially to internal IP ranges or unexpected external addresses. If possible, disable or restrict the vulnerable /?explorer/upload/serverDownload functionality until a patch or vendor response is available. Conduct internal network scans to identify sensitive services that could be targeted via SSRF and apply additional access controls or authentication to those services. Consider deploying runtime application self-protection (RASP) solutions to detect and block SSRF attempts in real time. Finally, maintain close monitoring of vendor communications for updates or patches and plan for timely application once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-25T09:05:18.132Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68acafccad5a09ad004e8bd2

Added to database: 8/25/2025, 6:47:40 PM

Last enriched: 8/25/2025, 7:02:53 PM

Last updated: 8/25/2025, 7:17:41 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats