CVE-2016-15044
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-23

Last updated on: 2025-07-25

Assigner: VulnCheck

Description
A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-23
Last Modified
2025-07-25
Generated
2026-05-06
AI Q&A
2025-07-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kaltura kaltura *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a remote code execution issue in Kaltura versions before 11.1.0-2. It occurs because the keditorservices module unsafely deserializes user-controlled data. An unauthenticated attacker can send a specially crafted serialized PHP object via the kdata GET parameter to the redirectWidgetCmd endpoint, which leads to execution of arbitrary PHP code on the web server.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an unauthenticated remote attacker to execute arbitrary PHP code on the web server running Kaltura. This can lead to full compromise of the server, unauthorized access to data, disruption of services, and potential further attacks within the network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart