Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists.
References
Link | Resource |
---|---|
https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c | Exploit Vendor Advisory |
https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c | Exploit Vendor Advisory |
Configurations
History
12 Jun 2025, 16:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-15 20:16
Updated : 2025-06-12 16:39
NVD link : CVE-2025-47786
Mitre link : CVE-2025-47786
CVE.ORG link : CVE-2025-47786
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')