VYPR
Medium severity6.3NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8753

CVE-2026-8753

Description

A security vulnerability has been detected in kalcaddle Kodbox up to 1.64. This issue affects the function parseVideoInfo of the file /workspace/source-code/plugins/fileThumb/lib/VideoResize.class.php of the component fileThumb Plugin. The manipulation of the argument ffmpegBin leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Kodbox up to 1.64 contains a post-authentication command injection in the fileThumb plugin's parseVideoInfo function via the ffmpegBin configuration parameter.

Vulnerability

Description A command injection vulnerability exists in kalcaddle Kodbox versions up to 1.64, specifically within the fileThumb plugin. The flaw resides in the parseVideoInfo function inside /workspace/source-code/plugins/fileThumb/lib/VideoResize.class.php. The ffmpegBin configuration parameter, which is used to specify the FFmpeg binary path, is directly concatenated into a shell command without proper sanitization, allowing an attacker to inject arbitrary operating system commands [1].

Exploitation

Prerequisites Exploitation requires an authenticated user who has the necessary rights to modify plugin configurations and access video preview features. The attack vector is remote and involves crafting a malicious ffmpegBin value through the plugin configuration endpoint (GET /?admin/plugin/setConfig&app=fileThumb&value=<JSON>&accessToken=<token>). When the modified configuration is subsequently used in the video preview pipeline (GET /?plugin/fileThumb/videoPreview&path=<upath>&accessToken=<token>), the injected command is executed via shell_exec() in parseVideoInfo() [1].

Impact

An authenticated attacker can execute arbitrary commands on the underlying server with the privileges of the web server process. This can lead to full compromise of the Kodbox installation, including data exfiltration, further lateral movement, and potential denial of service. The CVSS v3 score is 6.3 (Medium), though the reference assigns a higher severity of High (CVSS 8.1) due to the post-authentication requirement and potential for complete system compromise [1].

Mitigation

Status The vendor was contacted but did not respond; no official patch has been released as of the publication date (2026-05-17). A public proof-of-concept exploit is available. Users should upgrade to a patched version if released, or restrict access to the fileThumb plugin's configuration and preview endpoints to trusted administrators only. Consider disabling the plugin if not essential.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Kodcloud/Kodboxinferred2 versions
    <=1.64+ 1 more
    • (no CPE)range: <=1.64
    • (no CPE)range: <=1.64

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.