Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists.
CVSS
No CVSS.
References
Configurations
No configuration.
History
19 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c - |
16 May 2025, 14:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 May 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-15 20:16
Updated : 2025-05-19 15:15
NVD link : CVE-2025-47786
Mitre link : CVE-2025-47786
CVE.ORG link : CVE-2025-47786
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')