Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4831: Improper Authentication in kalcaddle kodbox

0
Medium
VulnerabilityCVE-2026-4831cvecve-2026-4831
Published: Thu Mar 26 2026 (03/26/2026, 01:02:35 UTC)
Source: CVE Database V5
Vendor/Project: kalcaddle
Product: kodbox

Description

A security flaw has been discovered in kalcaddle kodbox 1.64. Impacted is the function can of the file /workspace/source-code/app/controller/explorer/auth.class.php of the component Password-protected Share Handler. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:29:51 UTC

Technical Analysis

CVE-2026-4831 identifies an improper authentication vulnerability in kalcaddle kodbox version 1.64, specifically within the Password-protected Share Handler component. The vulnerability resides in the can function of the /workspace/source-code/app/controller/explorer/auth.class.php file. Improper authentication means that an attacker can bypass intended access controls, potentially gaining unauthorized access to shared resources. The attack vector is remote network access, requiring no prior authentication or user interaction, but the complexity is high, indicating that exploitation demands advanced skills or specific conditions. The CVSS 4.0 base score is 6.3 (medium), reflecting a balance between the impact and difficulty of exploitation. The vulnerability affects confidentiality due to unauthorized access but does not impact integrity or availability. The vendor was notified early but has not issued a patch or response, and a public exploit has been released, increasing the risk of exploitation. No known exploits in the wild have been reported yet, but the presence of a public exploit elevates the threat level. The vulnerability is limited to kodbox version 1.64, so other versions are not affected. Kodbox is a file management system used for cloud storage and file sharing, making this vulnerability relevant to organizations relying on it for secure file access and sharing.

Potential Impact

The primary impact of CVE-2026-4831 is unauthorized access to password-protected shares within kodbox 1.64 installations. This can lead to confidentiality breaches where sensitive files or data are exposed to attackers without proper authentication. Although the vulnerability does not directly affect data integrity or system availability, unauthorized access can facilitate further attacks such as data exfiltration, lateral movement, or privilege escalation if combined with other vulnerabilities. Organizations using kodbox for internal or external file sharing risk exposure of sensitive business or personal information. The lack of vendor response and patch availability prolongs the window of vulnerability, increasing the likelihood of exploitation especially since a public exploit exists. The high attack complexity reduces the number of potential attackers but does not eliminate the risk from skilled adversaries. Overall, the threat is moderate but significant for environments relying heavily on kodbox for secure file sharing.

Mitigation Recommendations

1. Immediately assess and inventory all kodbox 1.64 deployments within the organization to identify exposure. 2. Restrict network access to kodbox instances, especially from untrusted or public networks, using firewalls or VPNs to reduce remote attack surface. 3. Implement additional access controls at the network or application layer, such as IP whitelisting or multi-factor authentication, to compensate for the authentication bypass. 4. Monitor logs and network traffic for unusual access patterns or attempts targeting the Password-protected Share Handler component. 5. Consider temporarily disabling or limiting password-protected share functionality until a vendor patch or official fix is released. 6. Engage with the vendor or community for updates or unofficial patches and apply them promptly once available. 7. Educate users about the risk and encourage cautious sharing practices, avoiding sensitive data exposure via kodbox shares. 8. As a longer-term measure, evaluate alternative file sharing solutions with active security support and patch management. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Regularly review and update incident response plans to include scenarios involving unauthorized access through kodbox.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-25T14:11:38.305Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c57a7d3c064ed76f9f9d0a

Added to database: 3/26/2026, 6:27:09 PM

Last enriched: 3/26/2026, 6:29:51 PM

Last updated: 3/27/2026, 5:26:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses