A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process.
History

Thu, 24 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Jul 2025 22:15:00 +0000

Type Values Removed Values Added
Description A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process.
Title Kaltura < 11.1.0-2 PHP Object Injection RCE
Weaknesses CWE-502
CWE-94
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-07-23T22:02:04.812Z

Updated: 2025-07-24T13:36:57.890Z

Reserved: 2025-07-22T19:37:50.007Z

Link: CVE-2016-15044

cve-icon Vulnrichment

Updated: 2025-07-24T13:17:46.370Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-23T22:15:24.053

Modified: 2025-07-25T15:29:44.523

Link: CVE-2016-15044

cve-icon Redhat

No data.