A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/emlog/emlog/issues/305 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.289078 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.289078 | Third Party Advisory VDB Entry |
| https://github.com/emlog/emlog/issues/305 | Exploit Issue Tracking |
Configurations
History
05 Jun 2025, 19:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/emlog/emlog/issues/305 - Exploit, Issue Tracking | |
| References | () https://vuldb.com/?ctiid.289078 - Permissions Required, Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?id.289078 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
| First Time |
Emlog emlog
Emlog |
24 Dec 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-12-20 20:15
Updated : 2025-06-05 19:43
NVD link : CVE-2024-12842
Mitre link : CVE-2024-12842
CVE.ORG link : CVE-2024-12842
JSON object : View
Products Affected
emlog
- emlog
