CVE-2026-23636
Published: 25 March 2026
Summary
CVE-2026-23636 is a medium-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Accellion Kiteworks. Its CVSS base score is 5.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the missing validation allowing unrestricted upload of dangerous file types by enforcing comprehensive input validation on file uploads.
Prevents exploitation by restricting the types and characteristics of uploaded files to exclude dangerous types.
Mitigates the vulnerability through timely flaw remediation, such as applying the patch to version 9.2.1 that adds the missing file upload validation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload (CWE-434) in public-facing web app directly enables deployment of web shells or other malicious server components after authentication.
NVD Description
Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, the manager of a form could potentially exploit an Unrestricted Upload of File with Dangerous Type due to a missing validation. Upgrade Kiteworks to…
more
version 9.2.1 or later to receive a patch.
Deeper analysisAI
CVE-2026-23636 is an Unrestricted Upload of File with Dangerous Type vulnerability (CWE-434) in Kiteworks Secure Data Forms prior to version 9.2.1. Kiteworks is a private data network (PDN), and the flaw arises from missing validation that allows managers of a form to upload dangerous file types.
The vulnerability requires high privileges (PR:H), specifically a form manager account, and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation leads to high integrity impact (I:H) and low availability impact (A:L), with no confidentiality impact (C:N), yielding a CVSS v3.1 base score of 5.5 in an unchanged scope (S:U).
The Kiteworks security advisory recommends upgrading to version 9.2.1 or later to receive the patch that addresses the missing validation. Details are available in the GitHub Security Advisory at https://github.com/kiteworks/security-advisories/security/advisories/GHSA-cfv8-p3hq-8wmm.
Details
- CWE(s)