CVE-2016-15044

Kaltura <11.1.0-2 - Code Injection

Title source: llm

Description

A remote code execution vulnerability exists in Kaltura versions prior to 11.1.0-2 due to unsafe deserialization of user-controlled data within the keditorservices module. An unauthenticated remote attacker can exploit this issue by sending a specially crafted serialized PHP object in the kdata GET parameter to the redirectWidgetCmd endpoint. Successful exploitation leads to execution of arbitrary PHP code in the context of the web server process.

Exploits (3)

exploitdb WORKING POC
by Mehmet Ince · rubyremotephp
https://www.exploit-db.com/exploits/40404
exploitdb WORKING POC
by Security-Assessment.com · textwebappsphp
https://www.exploit-db.com/exploits/39563
metasploit WORKING POC EXCELLENT
by Security-Assessment.com, Mehmet Ince <[email protected]> · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/kaltura_unserialize_rce.rb

Scores

EPSS 0.6403
EPSS Percentile 98.4%

Classification

CWE
CWE-502 CWE-94
Status draft

Timeline

Published Jul 23, 2025
Tracked Since Feb 18, 2026