Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists.
References
Link | Resource |
---|---|
https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c | Exploit Vendor Advisory |
https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c | Exploit Vendor Advisory |
Configurations
History
12 Jun 2025, 16:39
Type | Values Removed | Values Added |
---|---|---|
First Time |
Emlog emlog
Emlog |
|
CPE | cpe:2.3:a:emlog:emlog:2.5.13:*:*:*:pro:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
References | () https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c - Exploit, Vendor Advisory |
19 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c - |
16 May 2025, 14:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 May 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-15 20:16
Updated : 2025-06-12 16:39
NVD link : CVE-2025-47786
Mitre link : CVE-2025-47786
CVE.ORG link : CVE-2025-47786
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')