CVE-2022-4876: CWE-79 Cross Site Scripting in Kaltura mwEmbed
A vulnerability was found in Kaltura mwEmbed up to 2.96.rc1 and classified as problematic. This issue affects some unknown processing of the file includes/DefaultSettings.php. The manipulation of the argument HTTP_X_FORWARDED_HOST leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.96.rc2 is able to address this issue. The patch is named 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217427.
AI Analysis
Technical Summary
CVE-2022-4876 is a cross-site scripting (XSS) vulnerability identified in Kaltura's mwEmbed component, specifically affecting versions up to 2.96.rc1. The vulnerability arises due to improper handling of the HTTP_X_FORWARDED_HOST header within the includes/DefaultSettings.php file. An attacker can manipulate this HTTP header to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS flaw. Exploitation requires the attacker to craft a malicious HTTP request with a manipulated HTTP_X_FORWARDED_HOST header and trick a user into visiting a specially crafted URL or interacting with the affected application. The vulnerability does not require authentication but does require user interaction (e.g., clicking a link). The CVSS v3.1 base score is 3.5, reflecting a low severity primarily due to the limited impact on confidentiality and availability, and the need for user interaction. The issue has been addressed in version 2.96.rc2 of mwEmbed, with a patch identified by commit 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Kaltura mwEmbed version 2.96.rc1 or earlier, this vulnerability presents a risk of client-side script injection, which can lead to session hijacking, defacement, or redirection to malicious sites. While the direct impact on server confidentiality and availability is minimal, the exploitation can undermine user trust and potentially facilitate further attacks such as phishing or credential theft. Organizations in sectors with high reliance on video content delivery, such as media, education, and corporate communications, may face reputational damage if exploited. Additionally, regulatory frameworks like GDPR emphasize protecting user data and preventing unauthorized access, so even low-severity vulnerabilities that lead to user data compromise or phishing could have compliance implications. The requirement for user interaction limits the attack vector but does not eliminate risk, especially in environments where users may be less security-aware.
Mitigation Recommendations
European organizations should prioritize upgrading Kaltura mwEmbed to version 2.96.rc2 or later to apply the official patch. If immediate upgrade is not feasible, implementing web application firewall (WAF) rules to sanitize or block suspicious HTTP_X_FORWARDED_HOST header values can reduce exposure. Additionally, organizations should conduct security awareness training to educate users about the risks of clicking unknown or suspicious links. Regular security assessments and penetration testing focusing on input validation and header manipulation can help identify similar vulnerabilities. Monitoring web server logs for unusual HTTP_X_FORWARDED_HOST header values may provide early detection of attempted exploitation. Finally, applying Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting the execution of unauthorized scripts in browsers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-4876: CWE-79 Cross Site Scripting in Kaltura mwEmbed
Description
A vulnerability was found in Kaltura mwEmbed up to 2.96.rc1 and classified as problematic. This issue affects some unknown processing of the file includes/DefaultSettings.php. The manipulation of the argument HTTP_X_FORWARDED_HOST leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.96.rc2 is able to address this issue. The patch is named 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217427.
AI-Powered Analysis
Technical Analysis
CVE-2022-4876 is a cross-site scripting (XSS) vulnerability identified in Kaltura's mwEmbed component, specifically affecting versions up to 2.96.rc1. The vulnerability arises due to improper handling of the HTTP_X_FORWARDED_HOST header within the includes/DefaultSettings.php file. An attacker can manipulate this HTTP header to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS flaw. Exploitation requires the attacker to craft a malicious HTTP request with a manipulated HTTP_X_FORWARDED_HOST header and trick a user into visiting a specially crafted URL or interacting with the affected application. The vulnerability does not require authentication but does require user interaction (e.g., clicking a link). The CVSS v3.1 base score is 3.5, reflecting a low severity primarily due to the limited impact on confidentiality and availability, and the need for user interaction. The issue has been addressed in version 2.96.rc2 of mwEmbed, with a patch identified by commit 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Kaltura mwEmbed version 2.96.rc1 or earlier, this vulnerability presents a risk of client-side script injection, which can lead to session hijacking, defacement, or redirection to malicious sites. While the direct impact on server confidentiality and availability is minimal, the exploitation can undermine user trust and potentially facilitate further attacks such as phishing or credential theft. Organizations in sectors with high reliance on video content delivery, such as media, education, and corporate communications, may face reputational damage if exploited. Additionally, regulatory frameworks like GDPR emphasize protecting user data and preventing unauthorized access, so even low-severity vulnerabilities that lead to user data compromise or phishing could have compliance implications. The requirement for user interaction limits the attack vector but does not eliminate risk, especially in environments where users may be less security-aware.
Mitigation Recommendations
European organizations should prioritize upgrading Kaltura mwEmbed to version 2.96.rc2 or later to apply the official patch. If immediate upgrade is not feasible, implementing web application firewall (WAF) rules to sanitize or block suspicious HTTP_X_FORWARDED_HOST header values can reduce exposure. Additionally, organizations should conduct security awareness training to educate users about the risks of clicking unknown or suspicious links. Regular security assessments and penetration testing focusing on input validation and header manipulation can help identify similar vulnerabilities. Monitoring web server logs for unusual HTTP_X_FORWARDED_HOST header values may provide early detection of attempted exploitation. Finally, applying Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting the execution of unauthorized scripts in browsers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-01-04T22:01:49.301Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68371692182aa0cae24f0c6e
Added to database: 5/28/2025, 1:58:42 PM
Last enriched: 7/7/2025, 9:28:02 AM
Last updated: 8/15/2025, 5:47:46 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.