{"api_version":"1","generated_at":"2026-04-20T04:41:00+00:00","cve":"CVE-2022-4944","urls":{"html":"https://cve.report/CVE-2022-4944","api":"https://cve.report/api/cve/CVE-2022-4944.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4944","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4944"},"summary":{"title":"CVE-2022-4944","description":"A vulnerability, which was classified as problematic, has been found in kalcaddle KodExplorer up to 4.49. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.50 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227000.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-04-22 18:15:00","updated_at":"2023-11-07 03:59:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://github.com/kalcaddle/KodExplorer/issues/512","name":"https://github.com/kalcaddle/KodExplorer/issues/512","refsource":"MISC","tags":[],"title":"Vulnerability: Cross-site Request Forgery (CSRF) to Remote Code Execution (RCE) · Issue #512 · kalcaddle/KodExplorer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.227000","name":"https://vuldb.com/?id.227000","refsource":"MISC","tags":[],"title":"CVE-2022-4944: kalcaddle KodExplorer cross-site request forgery (Issue 512)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/kalcaddle/KodExplorer/releases/tag/4.50","name":"https://github.com/kalcaddle/KodExplorer/releases/tag/4.50","refsource":"MISC","tags":[],"title":"Release 4.50 release · kalcaddle/KodExplorer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://vuldb.com/?ctiid.227000","name":"https://vuldb.com/?ctiid.227000","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file","name":"https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file","refsource":"MISC","tags":[],"title":"MediaFire","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4944","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4944","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4944","vulnerable":"1","versionEndIncluding":"4.49","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kodcloud","cpe5":"kodexplorer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4944","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as problematic, has been found in kalcaddle KodExplorer up to 4.49. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.50 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227000."},{"lang":"deu","value":"Eine problematische Schwachstelle wurde in kalcaddle KodExplorer bis 4.49 entdeckt. Davon betroffen ist unbekannter Code. Durch Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 4.50 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery","cweId":"CWE-352"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"kalcaddle","product":{"product_data":[{"product_name":"KodExplorer","version":{"version_data":[{"version_affected":"=","version_value":"4.0"},{"version_affected":"=","version_value":"4.1"},{"version_affected":"=","version_value":"4.2"},{"version_affected":"=","version_value":"4.3"},{"version_affected":"=","version_value":"4.4"},{"version_affected":"=","version_value":"4.5"},{"version_affected":"=","version_value":"4.6"},{"version_affected":"=","version_value":"4.7"},{"version_affected":"=","version_value":"4.8"},{"version_affected":"=","version_value":"4.9"},{"version_affected":"=","version_value":"4.10"},{"version_affected":"=","version_value":"4.11"},{"version_affected":"=","version_value":"4.12"},{"version_affected":"=","version_value":"4.13"},{"version_affected":"=","version_value":"4.14"},{"version_affected":"=","version_value":"4.15"},{"version_affected":"=","version_value":"4.16"},{"version_affected":"=","version_value":"4.17"},{"version_affected":"=","version_value":"4.18"},{"version_affected":"=","version_value":"4.19"},{"version_affected":"=","version_value":"4.20"},{"version_affected":"=","version_value":"4.21"},{"version_affected":"=","version_value":"4.22"},{"version_affected":"=","version_value":"4.23"},{"version_affected":"=","version_value":"4.24"},{"version_affected":"=","version_value":"4.25"},{"version_affected":"=","version_value":"4.26"},{"version_affected":"=","version_value":"4.27"},{"version_affected":"=","version_value":"4.28"},{"version_affected":"=","version_value":"4.29"},{"version_affected":"=","version_value":"4.30"},{"version_affected":"=","version_value":"4.31"},{"version_affected":"=","version_value":"4.32"},{"version_affected":"=","version_value":"4.33"},{"version_affected":"=","version_value":"4.34"},{"version_affected":"=","version_value":"4.35"},{"version_affected":"=","version_value":"4.36"},{"version_affected":"=","version_value":"4.37"},{"version_affected":"=","version_value":"4.38"},{"version_affected":"=","version_value":"4.39"},{"version_affected":"=","version_value":"4.40"},{"version_affected":"=","version_value":"4.41"},{"version_affected":"=","version_value":"4.42"},{"version_affected":"=","version_value":"4.43"},{"version_affected":"=","version_value":"4.44"},{"version_affected":"=","version_value":"4.45"},{"version_affected":"=","version_value":"4.46"},{"version_affected":"=","version_value":"4.47"},{"version_affected":"=","version_value":"4.48"},{"version_affected":"=","version_value":"4.49"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.227000","refsource":"MISC","name":"https://vuldb.com/?id.227000"},{"url":"https://vuldb.com/?ctiid.227000","refsource":"MISC","name":"https://vuldb.com/?ctiid.227000"},{"url":"https://github.com/kalcaddle/KodExplorer/issues/512","refsource":"MISC","name":"https://github.com/kalcaddle/KodExplorer/issues/512"},{"url":"https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file","refsource":"MISC","name":"https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file"},{"url":"https://github.com/kalcaddle/KodExplorer/releases/tag/4.50","refsource":"MISC","name":"https://github.com/kalcaddle/KodExplorer/releases/tag/4.50"}]},"credits":[{"lang":"en","value":"mrempy (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}]}},"nvd":{"publishedDate":"2023-04-22 18:15:00","lastModifiedDate":"2023-11-07 03:59:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:kodcloud:kodexplorer:*:*:*:*:*:*:*:*","versionEndIncluding":"4.49","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}