{"api_version":"1","generated_at":"2026-04-20T01:14:17+00:00","cve":"CVE-2026-6572","urls":{"html":"https://cve.report/CVE-2026-6572","api":"https://cve.report/api/cve/CVE-2026-6572.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-6572","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-6572"},"summary":{"title":"Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization","description":"A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-04-19 13:16:45","updated_at":"2026-04-19 13:16:45"},"problem_types":["CWE-266","CWE-285","CWE-285 Improper Authorization","CWE-266 Incorrect Privilege Assignment"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"6.3","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"6.3","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Primary","score":"5.6","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.6","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"5.6","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"5.1","severity":"","vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"5.1","severity":"","vector":"AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","data":{"baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://vuldb.com/vuln/358206/cti","name":"https://vuldb.com/vuln/358206/cti","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/submit/789988","name":"https://vuldb.com/submit/789988","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/358206","name":"https://vuldb.com/vuln/358206","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vulnplus-note.wetolink.com/share/PLCI4v0BWaF8","name":"https://vulnplus-note.wetolink.com/share/PLCI4v0BWaF8","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-6572","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6572","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.0","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.1","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.2","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.3","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.4","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.5","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.6","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.7","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.8","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.9","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.10","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.11","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.12","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.13","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.14","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.15","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.16","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.17","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.18","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.19","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.20","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.21","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.22","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.23","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.24","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.25","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.26","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.27","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.28","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.29","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.30","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.31","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.32","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.33","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.34","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.35","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.36","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.37","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.38","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.39","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.40","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.41","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.42","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.43","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.44","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.45","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.46","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.47","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.48","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.49","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.50","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.51","platforms":[]},{"source":"CNA","vendor":"Collabora","product":"KodExplorer","version":"affected 4.52","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-04-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-04-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-04-18T21:12:43.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"vulnplusbot (VulDB User)","lang":"en"},{"source":"CNA","value":"VulDB CNA Team","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"modules":["fileUpload Endpoint"],"product":"KodExplorer","vendor":"Collabora","versions":[{"status":"affected","version":"4.0"},{"status":"affected","version":"4.1"},{"status":"affected","version":"4.2"},{"status":"affected","version":"4.3"},{"status":"affected","version":"4.4"},{"status":"affected","version":"4.5"},{"status":"affected","version":"4.6"},{"status":"affected","version":"4.7"},{"status":"affected","version":"4.8"},{"status":"affected","version":"4.9"},{"status":"affected","version":"4.10"},{"status":"affected","version":"4.11"},{"status":"affected","version":"4.12"},{"status":"affected","version":"4.13"},{"status":"affected","version":"4.14"},{"status":"affected","version":"4.15"},{"status":"affected","version":"4.16"},{"status":"affected","version":"4.17"},{"status":"affected","version":"4.18"},{"status":"affected","version":"4.19"},{"status":"affected","version":"4.20"},{"status":"affected","version":"4.21"},{"status":"affected","version":"4.22"},{"status":"affected","version":"4.23"},{"status":"affected","version":"4.24"},{"status":"affected","version":"4.25"},{"status":"affected","version":"4.26"},{"status":"affected","version":"4.27"},{"status":"affected","version":"4.28"},{"status":"affected","version":"4.29"},{"status":"affected","version":"4.30"},{"status":"affected","version":"4.31"},{"status":"affected","version":"4.32"},{"status":"affected","version":"4.33"},{"status":"affected","version":"4.34"},{"status":"affected","version":"4.35"},{"status":"affected","version":"4.36"},{"status":"affected","version":"4.37"},{"status":"affected","version":"4.38"},{"status":"affected","version":"4.39"},{"status":"affected","version":"4.40"},{"status":"affected","version":"4.41"},{"status":"affected","version":"4.42"},{"status":"affected","version":"4.43"},{"status":"affected","version":"4.44"},{"status":"affected","version":"4.45"},{"status":"affected","version":"4.46"},{"status":"affected","version":"4.47"},{"status":"affected","version":"4.48"},{"status":"affected","version":"4.49"},{"status":"affected","version":"4.50"},{"status":"affected","version":"4.51"},{"status":"affected","version":"4.52"}]}],"credits":[{"lang":"en","type":"reporter","value":"vulnplusbot (VulDB User)"},{"lang":"en","type":"coordinator","value":"VulDB CNA Team"}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"Improper Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-266","description":"Incorrect Privilege Assignment","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-19T12:15:14.167Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-358206 | Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/vuln/358206"},{"name":"VDB-358206 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/vuln/358206/cti"},{"name":"Submit #789988 | KodExplorer 4.52 Business Logic Bypass","tags":["third-party-advisory"],"url":"https://vuldb.com/submit/789988"},{"tags":["broken-link","exploit"],"url":"https://vulnplus-note.wetolink.com/share/PLCI4v0BWaF8"}],"timeline":[{"lang":"en","time":"2026-04-18T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-04-18T02:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-04-18T21:12:43.000Z","value":"VulDB entry last update"}],"title":"Collabora KodExplorer fileUpload Endpoint share.class.php improper authorization"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-6572","datePublished":"2026-04-19T12:15:14.167Z","dateReserved":"2026-04-18T19:07:07.145Z","dateUpdated":"2026-04-19T12:15:14.167Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-19 13:16:45","lastModifiedDate":"2026-04-19 13:16:45","problem_types":["CWE-266","CWE-285","CWE-285 Improper Authorization","CWE-266 Incorrect Privilege Assignment"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":3.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"6572","Ordinal":"1","Title":"Collabora KodExplorer fileUpload Endpoint share.class.php improp","CVE":"CVE-2026-6572","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"6572","Ordinal":"1","NoteData":"A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","Type":"Description","Title":"Collabora KodExplorer fileUpload Endpoint share.class.php improp"}]}}}