TopVuln

High-risk vulnerability digests

CVE-2026-6568

  • MEDIUM

Details

CVSS v3
7.3
CVSS v4
6.9
CVSS v2
7.5
NVD published
2026-04-19 10:16:09
EPSS
0.1% probability · 30.3th percentile — 2026-05-12
Affected versions
kodcloud KodExplorer up to 4.52
Summary
This path traversal vulnerability impacts the Public Share Handler component of kodcloud KodExplorer. Remote attackers can manipulate the path argument to access arbitrary files outside of the intended restricted directory on the affected server. The exploit has been publicly disclosed, and the vendor has not responded to the disclosure.
Remediation
Restrict access to the public share functionality of KodExplorer to only trusted users until an official patch is released. Check the official kodcloud KodExplorer repository for security updates and upgrade to the latest patched version as soon as it becomes available. Implement WAF rules to block malicious path traversal attempts as a temporary mitigation.
Exploit info
This exploit has been publicly disclosed, with references to this issue documented in trusted public vulnerability databases. Potential exploit details can be searched in Exploit-DB or GitHub.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.