A Server-Side Request Forgery (SSRF) in the component sort.php of Emlog Pro v2.5.4 allows attackers to scan local and internal ports via supplying a crafted URL.
References
Link | Resource |
---|---|
http://emlogpro.com | Not Applicable |
https://github.com/Ka7arotto/emlog/blob/main/ssrf.md | Broken Link |
https://www.emlog.net/ | Product |
Configurations
History
07 Apr 2025, 18:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:emlog:emlog:2.5.4:*:*:*:pro:*:*:* | |
First Time |
Emlog
Emlog emlog |
|
References | () http://emlogpro.com - Not Applicable | |
References | () https://github.com/Ka7arotto/emlog/blob/main/ssrf.md - Broken Link | |
References | () https://www.emlog.net/ - Product |
06 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
CWE | CWE-918 |
26 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 15:15
Updated : 2025-04-07 18:52
NVD link : CVE-2025-25827
Mitre link : CVE-2025-25827
CVE.ORG link : CVE-2025-25827
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-918
Server-Side Request Forgery (SSRF)