CVE-2024-3763

A vulnerability was found in Emlog Pro 2.2.10. It has been rated as problematic. This issue affects some unknown processing of the file /admin/tag.php of the component Post Tag Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260603. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md Exploit
https://vuldb.com/?ctiid.260603 Permissions Required VDB Entry
https://vuldb.com/?id.260603 Permissions Required VDB Entry
https://vuldb.com/?submit.311808 Third Party Advisory VDB Entry
https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md Exploit
https://vuldb.com/?ctiid.260603 Permissions Required VDB Entry
https://vuldb.com/?id.260603 Permissions Required VDB Entry
https://vuldb.com/?submit.311808 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:emlog:emlog:2.2.10:*:*:*:pro:*:*:*

History

05 Mar 2025, 18:25

Type Values Removed Values Added
CPE cpe:2.3:a:emlog:emlog:2.2.10:*:*:*:pro:*:*:*
First Time Emlog
Emlog emlog
References () https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md - () https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md - Exploit
References () https://vuldb.com/?ctiid.260603 - () https://vuldb.com/?ctiid.260603 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.260603 - () https://vuldb.com/?id.260603 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.311808 - () https://vuldb.com/?submit.311808 - Third Party Advisory, VDB Entry

Information

Published : 2024-04-14 23:15

Updated : 2025-03-05 18:25


NVD link : CVE-2024-3763

Mitre link : CVE-2024-3763

CVE.ORG link : CVE-2024-3763


JSON object : View

Products Affected

emlog

  • emlog
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')