Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28270: CWE-434: Unrestricted Upload of File with Dangerous Type in kiteworks security-advisories

0
Medium
VulnerabilityCVE-2026-28270cvecve-2026-28270cwe-434
Published: Fri Feb 27 2026 (02/27/2026, 20:19:54 UTC)
Source: CVE Database V5
Vendor/Project: kiteworks
Product: security-advisories

Description

CVE-2026-28270 is a medium-severity vulnerability in Kiteworks private data network versions prior to 9. 2. 0 that allows malicious administrators to upload arbitrary files without proper validation. This unrestricted file upload issue (CWE-434) can lead to integrity compromise by enabling unauthorized file types to be placed on the system. Exploitation requires administrative privileges but no user interaction and can be performed remotely over the network. The vulnerability does not impact confidentiality or availability directly but can be leveraged to alter system files or introduce malicious content. Kiteworks patched this flaw in version 9. 2. 0. Organizations using affected versions should upgrade promptly and review administrative access controls to mitigate risk.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:57:40 UTC

Technical Analysis

CVE-2026-28270 is a vulnerability identified in the Kiteworks private data network (PDN) product, specifically affecting versions prior to 9.2.0. The root cause is an unrestricted file upload flaw categorized under CWE-434, where the system fails to properly validate file types during upload operations. This allows malicious administrators—users with elevated privileges—to upload arbitrary and potentially dangerous file types to the system. Since Kiteworks is used for secure data exchange and storage, the ability to upload unauthorized files can compromise the integrity of the system by introducing malicious scripts, executables, or other harmful content. The vulnerability requires administrative privileges (PR:H) but no user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The CVSS v3.1 base score is 4.9, reflecting a medium severity level primarily due to the requirement for privileged access and the lack of direct confidentiality or availability impact. Kiteworks addressed this vulnerability in version 9.2.0 by implementing proper file type validation controls to prevent unauthorized uploads. No known exploits are currently reported in the wild, but the risk remains for organizations running outdated versions with insufficient administrative controls.

Potential Impact

The primary impact of CVE-2026-28270 is on the integrity of the Kiteworks system. By allowing malicious administrators to upload arbitrary files, attackers can introduce unauthorized or malicious content that may alter system behavior, compromise data integrity, or facilitate further attacks such as privilege escalation or persistence mechanisms. Although confidentiality and availability are not directly affected, the integrity compromise can indirectly lead to data breaches or system misuse. Organizations relying on Kiteworks for secure data transfer and storage could face operational disruption or reputational damage if this vulnerability is exploited. The requirement for administrative privileges limits the attack surface to insiders or compromised admin accounts, but the risk remains significant in environments with weak access controls or insufficient monitoring.

Mitigation Recommendations

To mitigate CVE-2026-28270, organizations should immediately upgrade Kiteworks installations to version 9.2.0 or later, where the vulnerability is patched with proper file type validation. Additionally, organizations must enforce strict administrative access controls, including multi-factor authentication and least privilege principles, to reduce the risk of malicious insiders exploiting this flaw. Regular audits of administrator activities and file uploads should be conducted to detect anomalous behavior. Implementing network segmentation and monitoring for unusual file upload patterns can further reduce risk. Where upgrading is not immediately possible, temporarily restricting file upload permissions or disabling upload features for administrators not requiring them can serve as a stopgap measure. Finally, organizations should maintain up-to-date incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.733Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a2016632ffcdb8a26f3244

Added to database: 2/27/2026, 8:41:10 PM

Last enriched: 2/27/2026, 8:57:40 PM

Last updated: 2/27/2026, 10:32:12 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses