CVE-2026-1066

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on systems running vulnerable versions of kalcaddle kodbox. The command injection occurs through the compression handler component when processing zip files. All users of kodbox up to version 1.61.10 are affected.

💻 Affected Systems

Products:
  • kalcaddle kodbox
Versions: Up to and including 1.61.10
Operating Systems: All platforms running kodbox
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the compression handler component when processing zip files via the /?explorer/index/zip endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the server, allowing data theft, ransomware deployment, or use as a botnet node.

🟠

Likely Case

Unauthorized file system access, data exfiltration, and installation of backdoors or cryptocurrency miners.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place, potentially containing the attack to the web application server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available, making this easily weaponizable. Remote exploitation without authentication is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Upgrade to version 1.61.11 or later if released by vendor. Monitor vendor channels for updates.

🔧 Temporary Workarounds

Disable Compression Handler

all

Temporarily disable the vulnerable compression handler endpoint

# Modify kodbox configuration to disable /?explorer/index/zip endpoint
# Check kodbox documentation for specific configuration options

Web Application Firewall Rule

all

Block malicious requests to the vulnerable endpoint

# WAF rule to block requests containing command injection patterns to /?explorer/index/zip
# Example: mod_security rule for Apache

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate kodbox instances from critical systems
  • Deploy application-level monitoring and alerting for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check kodbox version. If version is 1.61.10 or earlier, system is vulnerable.

Check Version:

Check kodbox version in admin panel or read version file in installation directory

Verify Fix Applied:

Verify version is 1.61.11 or later, or test the /?explorer/index/zip endpoint with safe payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in web server logs
  • Suspicious POST requests to /?explorer/index/zip containing shell metacharacters
  • Unexpected system processes spawned from web server user

Network Indicators:

  • Outbound connections from web server to suspicious IPs
  • Unusual data exfiltration patterns

SIEM Query:

source="web_logs" AND uri="/?explorer/index/zip" AND (payload="|" OR payload="$" OR payload="&" OR payload=";")

🔗 References

📤 Share & Export