CVE-2022-4876: CWE-79 Cross Site Scripting in Kaltura mwEmbed
A vulnerability was found in Kaltura mwEmbed up to 2.96.rc1 and classified as problematic. This issue affects some unknown processing of the file includes/DefaultSettings.php. The manipulation of the argument HTTP_X_FORWARDED_HOST leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.96.rc2 is able to address this issue. The patch is named 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217427.
AI Analysis
Technical Summary
CVE-2022-4876 is a cross-site scripting (XSS) vulnerability identified in Kaltura's mwEmbed component, specifically affecting versions up to 2.96.rc1. The vulnerability arises due to improper handling of the HTTP_X_FORWARDED_HOST header within the includes/DefaultSettings.php file. An attacker can manipulate this HTTP header to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS flaw. Exploitation requires the attacker to craft a malicious HTTP request with a manipulated HTTP_X_FORWARDED_HOST header and trick a user into visiting a specially crafted URL or interacting with the affected application. The vulnerability does not require authentication but does require user interaction (e.g., clicking a link). The CVSS v3.1 base score is 3.5, reflecting a low severity primarily due to the limited impact on confidentiality and availability, and the need for user interaction. The issue has been addressed in version 2.96.rc2 of mwEmbed, with a patch identified by commit 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Kaltura mwEmbed version 2.96.rc1 or earlier, this vulnerability presents a risk of client-side script injection, which can lead to session hijacking, defacement, or redirection to malicious sites. While the direct impact on server confidentiality and availability is minimal, the exploitation can undermine user trust and potentially facilitate further attacks such as phishing or credential theft. Organizations in sectors with high reliance on video content delivery, such as media, education, and corporate communications, may face reputational damage if exploited. Additionally, regulatory frameworks like GDPR emphasize protecting user data and preventing unauthorized access, so even low-severity vulnerabilities that lead to user data compromise or phishing could have compliance implications. The requirement for user interaction limits the attack vector but does not eliminate risk, especially in environments where users may be less security-aware.
Mitigation Recommendations
European organizations should prioritize upgrading Kaltura mwEmbed to version 2.96.rc2 or later to apply the official patch. If immediate upgrade is not feasible, implementing web application firewall (WAF) rules to sanitize or block suspicious HTTP_X_FORWARDED_HOST header values can reduce exposure. Additionally, organizations should conduct security awareness training to educate users about the risks of clicking unknown or suspicious links. Regular security assessments and penetration testing focusing on input validation and header manipulation can help identify similar vulnerabilities. Monitoring web server logs for unusual HTTP_X_FORWARDED_HOST header values may provide early detection of attempted exploitation. Finally, applying Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting the execution of unauthorized scripts in browsers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-4876: CWE-79 Cross Site Scripting in Kaltura mwEmbed
Description
A vulnerability was found in Kaltura mwEmbed up to 2.96.rc1 and classified as problematic. This issue affects some unknown processing of the file includes/DefaultSettings.php. The manipulation of the argument HTTP_X_FORWARDED_HOST leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.96.rc2 is able to address this issue. The patch is named 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217427.
AI-Powered Analysis
Technical Analysis
CVE-2022-4876 is a cross-site scripting (XSS) vulnerability identified in Kaltura's mwEmbed component, specifically affecting versions up to 2.96.rc1. The vulnerability arises due to improper handling of the HTTP_X_FORWARDED_HOST header within the includes/DefaultSettings.php file. An attacker can manipulate this HTTP header to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS flaw. Exploitation requires the attacker to craft a malicious HTTP request with a manipulated HTTP_X_FORWARDED_HOST header and trick a user into visiting a specially crafted URL or interacting with the affected application. The vulnerability does not require authentication but does require user interaction (e.g., clicking a link). The CVSS v3.1 base score is 3.5, reflecting a low severity primarily due to the limited impact on confidentiality and availability, and the need for user interaction. The issue has been addressed in version 2.96.rc2 of mwEmbed, with a patch identified by commit 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations using Kaltura mwEmbed version 2.96.rc1 or earlier, this vulnerability presents a risk of client-side script injection, which can lead to session hijacking, defacement, or redirection to malicious sites. While the direct impact on server confidentiality and availability is minimal, the exploitation can undermine user trust and potentially facilitate further attacks such as phishing or credential theft. Organizations in sectors with high reliance on video content delivery, such as media, education, and corporate communications, may face reputational damage if exploited. Additionally, regulatory frameworks like GDPR emphasize protecting user data and preventing unauthorized access, so even low-severity vulnerabilities that lead to user data compromise or phishing could have compliance implications. The requirement for user interaction limits the attack vector but does not eliminate risk, especially in environments where users may be less security-aware.
Mitigation Recommendations
European organizations should prioritize upgrading Kaltura mwEmbed to version 2.96.rc2 or later to apply the official patch. If immediate upgrade is not feasible, implementing web application firewall (WAF) rules to sanitize or block suspicious HTTP_X_FORWARDED_HOST header values can reduce exposure. Additionally, organizations should conduct security awareness training to educate users about the risks of clicking unknown or suspicious links. Regular security assessments and penetration testing focusing on input validation and header manipulation can help identify similar vulnerabilities. Monitoring web server logs for unusual HTTP_X_FORWARDED_HOST header values may provide early detection of attempted exploitation. Finally, applying Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting the execution of unauthorized scripts in browsers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-01-04T22:01:49.301Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68371692182aa0cae24f0c6e
Added to database: 5/28/2025, 1:58:42 PM
Last enriched: 7/7/2025, 9:28:02 AM
Last updated: 10/15/2025, 2:17:11 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54278: Heap-based Buffer Overflow (CWE-122) in Adobe Bridge
MediumCVE-2025-54268: Heap-based Buffer Overflow (CWE-122) in Adobe Bridge
HighCVE-2024-13991: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Huijietong Cloud Video Platform
HighCVE-2023-7311: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in BYTEVALUE (Luoyang Baiwei Intelligent Technology Co., Ltd.) Flow Control Router
CriticalCVE-2023-7305: CWE-434 Unrestricted Upload of File with Dangerous Type in Guangzhou Smart Software Co., Ltd. SmartBI
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.