An arbitrary file upload vulnerability in the component /views/plugin.php of emlog pro v2.5.7 allows attackers to execute arbitrary code via uploading a crafted PHP file.
References
Link | Resource |
---|---|
https://github.com/bGl1o/emlogpro/blob/main/emlog%20pro2.5.7-getshell.md | Exploit Third Party Advisory |
https://github.com/bGl1o/emlogpro/blob/main/emlog%20pro2.5.7-getshell.md | Exploit Third Party Advisory |
Configurations
History
16 Jun 2025, 18:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Emlog
Emlog emlog |
|
References | () https://github.com/bGl1o/emlogpro/blob/main/emlog%20pro2.5.7-getshell.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:emlog:emlog:2.5.7:*:*:*:pro:*:*:* |
25 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bGl1o/emlogpro/blob/main/emlog%20pro2.5.7-getshell.md - | |
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
19 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-19 16:15
Updated : 2025-06-16 18:49
NVD link : CVE-2025-29401
Mitre link : CVE-2025-29401
CVE.ORG link : CVE-2025-29401
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')