Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64325: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in EmbySupport Emby.Security

0
High
VulnerabilityCVE-2025-64325cvecve-2025-64325cwe-79cwe-116
Published: Tue Nov 18 2025 (11/18/2025, 22:32:06 UTC)
Source: CVE Database V5
Vendor/Project: EmbySupport
Product: Emby.Security

Description

Emby Server is a personal media server. Prior to version 4.8.1.0 and prior to Beta version 4.9.0.0-beta, a malicious user can send an authentication request with a manipulated X-Emby-Client value, which gets added to the devices section of the admin dashboard without sanitization. This issue has been patched in version 4.8.1.0 and Beta version 4.9.0.0-beta.

AI-Powered Analysis

AILast updated: 11/18/2025, 22:46:56 UTC

Technical Analysis

CVE-2025-64325 is a Cross-site Scripting (XSS) vulnerability categorized under CWE-79 and CWE-116, affecting Emby Server, a personal media server application. The vulnerability exists in the Emby.Security component where the X-Emby-Client HTTP header value is incorporated into the admin dashboard's devices section without proper input neutralization or sanitization. This allows a malicious user to craft an authentication request with a manipulated X-Emby-Client header, which when viewed by an administrator on the dashboard, can execute arbitrary JavaScript code in the administrator's browser context. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L - low privileges), but does require user interaction (UI:A) as the admin must view the dashboard. The vulnerability impacts confidentiality and integrity highly (VC:H, VI:H), but does not affect availability or authentication mechanisms. The vulnerability affects Emby Server versions prior to 4.8.1.0 and Beta versions prior to 4.9.0.0-beta. The vendor has addressed the issue in these versions by implementing proper input sanitization. No known exploits have been reported in the wild as of publication. The vulnerability allows attackers to potentially hijack admin sessions, steal sensitive information, or perform unauthorized actions via script execution in the admin interface.

Potential Impact

For European organizations using Emby Server, especially those deploying it for internal media management or as part of broader IT infrastructure, this vulnerability could lead to significant security breaches. Exploitation could allow attackers to execute malicious scripts in the context of administrative users, potentially leading to session hijacking, credential theft, or unauthorized administrative actions. This compromises the confidentiality and integrity of the system and any data accessible through the admin dashboard. Given that Emby Server is often used in small to medium enterprises and private organizations, the impact may be more pronounced in environments where administrative security practices are less stringent. Additionally, if Emby Server is exposed to untrusted networks or the internet, the risk of exploitation increases. The vulnerability could also serve as a foothold for lateral movement within networks, especially if administrators reuse credentials or if the compromised admin interface controls other critical systems.

Mitigation Recommendations

European organizations should immediately upgrade Emby Server installations to version 4.8.1.0 or later, or Beta version 4.9.0.0-beta or later, where the vulnerability is patched. Until upgrades can be applied, organizations should restrict access to the Emby Server admin dashboard to trusted internal networks and implement network-level controls such as IP whitelisting or VPN access. Administrators should be trained to recognize suspicious activity and avoid interacting with untrusted devices or clients that could send malicious headers. Web application firewalls (WAFs) can be configured to detect and block suspicious X-Emby-Client header values containing script payloads. Regular monitoring and logging of admin dashboard access and unusual device registrations should be implemented to detect potential exploitation attempts. Finally, organizations should enforce strong authentication and session management practices to limit the impact of any successful XSS exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.028Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691cf5c07ccfba78bc8d7b32

Added to database: 11/18/2025, 10:40:00 PM

Last enriched: 11/18/2025, 10:46:56 PM

Last updated: 11/19/2025, 3:48:18 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats