Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue.
References
Configurations
History
14 Apr 2025, 14:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
|
References | () https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c - Exploit | |
First Time |
Emlog
Emlog emlog |
|
CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* |
28 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c - |
28 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-28 15:15
Updated : 2025-04-14 14:49
NVD link : CVE-2025-30372
Mitre link : CVE-2025-30372
CVE.ORG link : CVE-2025-30372
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')