CVE-2025-47786

Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists.
CVSS

No CVSS.

Configurations

No configuration.

History

19 May 2025, 15:15

Type Values Removed Values Added
References () https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c - () https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c -

16 May 2025, 14:42

Type Values Removed Values Added
Summary
  • (es) Emlog es un sistema de código abierto para la creación de sitios web. La versión 2.5.13 presenta una vulnerabilidad de cross-site scripting almacenado que permite a cualquier usuario registrado crear JavaScript malicioso, induciendo a todos los usuarios del sitio web a hacer clic. En `/admin/comment.php`, el parámetro `perpage_num` no está validado y se almacena directamente en el campo `admin_commend_perpage_num` de la tabla `emlog_options` de la base de datos. Además, la salida no se filtra, lo que resulta en la salida directa de código malicioso. Al momento de la publicación, no se sabe con certeza si existe un parche.

15 May 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-15 20:16

Updated : 2025-05-19 15:15


NVD link : CVE-2025-47786

Mitre link : CVE-2025-47786

CVE.ORG link : CVE-2025-47786


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')