Emlog is an open source website building system. A stored Cross-Site Scripting (XSS) vulnerability exists in the "Twitter"feature of EMLOG Pro 2.5.21 and below. An authenticated user with privileges to post a "Twitter" message can inject arbitrary JavaScript code. The malicious script is stored on the server and gets executed in the browser of any user, including administrators, when they click on the malicious post to view it. This issue does not currently have a fix.
References
| Link | Resource |
|---|---|
| https://github.com/emlog/emlog/security/advisories/GHSA-rm5c-mjpg-vm89 | Exploit Third Party Advisory |
Configurations
History
08 Oct 2025, 15:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Emlog emlog
Emlog |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
| CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
| References | () https://github.com/emlog/emlog/security/advisories/GHSA-rm5c-mjpg-vm89 - Exploit, Third Party Advisory |
03 Oct 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-03 07:15
Updated : 2025-10-08 15:26
NVD link : CVE-2025-61599
Mitre link : CVE-2025-61599
CVE.ORG link : CVE-2025-61599
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
