CVE-2025-64325
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-11-19
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| emby | server | 4.8.1.0 |
| emby | server | 4.9.0.0-beta |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Emby Server allows a malicious user to send an authentication request with a manipulated X-Emby-Client value. This manipulated value is then added to the devices section of the admin dashboard without proper sanitization, potentially allowing the attacker to inject malicious data or cause unexpected behavior. The issue affects versions prior to 4.8.1.0 and Beta versions prior to 4.9.0.0-beta and has been patched in those versions.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker to inject manipulated data into the admin dashboard's devices section, which could lead to misleading information being displayed or potentially further exploitation depending on how the unsanitized data is handled. This could compromise the integrity of the admin interface and potentially affect the security of the server.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update Emby Server to version 4.8.1.0 or later, or to Beta version 4.9.0.0-beta or later, where the issue has been patched.