Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23514: CWE-282: Improper Ownership Management in kiteworks core

0
High
VulnerabilityCVE-2026-23514cvecve-2026-23514cwe-282
Published: Wed Mar 25 2026 (03/25/2026, 14:19:01 UTC)
Source: CVE Database V5
Vendor/Project: kiteworks
Product: core

Description

Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 14:45:58 UTC

Technical Analysis

CVE-2026-23514 is an access control vulnerability identified in Kiteworks Core, a private data network platform designed for secure file sharing and collaboration. The vulnerability arises from improper ownership management (classified under CWE-282), which means the system fails to correctly enforce access permissions, allowing authenticated users to access content they are not authorized to view or modify. Specifically, versions 9.2.0 and 9.2.1 of Kiteworks Core are affected. The flaw does not require user interaction and has a low attack complexity, but it does require the attacker to have valid authentication credentials. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized access could lead to data leakage, unauthorized data modification, or disruption of services. The CVSS v3.1 base score is 8.8, reflecting the high severity of this issue. Kiteworks Core is widely used in sectors requiring secure data exchange, such as finance, healthcare, and government. The vendor has released version 9.2.2 to address this vulnerability, and upgrading is the primary remediation step. No public exploits have been reported yet, but the high severity and ease of exploitation make timely patching critical.

Potential Impact

The vulnerability allows authenticated users to bypass access controls and access unauthorized content, which can lead to significant data breaches involving sensitive or confidential information. This compromises the confidentiality of data stored or shared via Kiteworks Core. Additionally, unauthorized modification or deletion of data could occur, impacting data integrity and potentially disrupting business operations, thus affecting availability. Organizations relying on Kiteworks Core for secure collaboration and file sharing are at risk of insider threats or compromised accounts being leveraged to escalate access privileges. The breach of sensitive data could result in regulatory penalties, reputational damage, and financial losses. Given the nature of Kiteworks as a private data network, the impact is particularly severe in industries handling regulated or classified information. The ease of exploitation and lack of required user interaction increase the likelihood of exploitation once credentials are obtained.

Mitigation Recommendations

1. Immediately upgrade all Kiteworks Core instances to version 9.2.2 or later, as this version contains the patch for CVE-2026-23514. 2. Conduct a thorough audit of user permissions and access controls within Kiteworks Core to ensure least privilege principles are enforced and no excessive permissions exist. 3. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. 4. Monitor access logs for unusual or unauthorized access patterns that could indicate exploitation attempts. 5. Restrict access to Kiteworks Core administration interfaces and sensitive content repositories to trusted networks and users. 6. Educate users about credential security and the risks of phishing or credential theft, which could lead to exploitation of this vulnerability. 7. Consider deploying network segmentation and data loss prevention (DLP) tools to limit the impact of unauthorized data access. 8. Maintain an incident response plan specifically addressing potential data breaches stemming from access control failures.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.979Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c3f1b2f4197a8e3b5542d5

Added to database: 3/25/2026, 2:31:14 PM

Last enriched: 3/25/2026, 2:45:58 PM

Last updated: 3/26/2026, 5:09:07 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses