A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Jul 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process. | |
Title | Kaltura < 11.1.0-2 PHP Object Injection RCE | |
Weaknesses | CWE-502 CWE-94 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-23T22:02:04.812Z
Updated: 2025-07-24T13:36:57.890Z
Reserved: 2025-07-22T19:37:50.007Z
Link: CVE-2016-15044

Updated: 2025-07-24T13:17:46.370Z

Status : Awaiting Analysis
Published: 2025-07-23T22:15:24.053
Modified: 2025-07-25T15:29:44.523
Link: CVE-2016-15044

No data.