Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Jun 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Emlog
Emlog emlog |
|
CPEs | cpe:2.3:a:emlog:emlog:2.5.13:*:*:*:pro:*:*:* | |
Vendors & Products |
Emlog
Emlog emlog |
|
Metrics |
cvssV3_1
|
Mon, 19 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 15 May 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists. | |
Title | Emlog vulnerable to Stored Cross-site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-15T19:33:24.271Z
Updated: 2025-05-19T14:40:12.463Z
Reserved: 2025-05-09T19:49:35.621Z
Link: CVE-2025-47786

Updated: 2025-05-19T14:40:02.599Z

Status : Analyzed
Published: 2025-05-15T20:16:09.077
Modified: 2025-06-12T16:39:25.020
Link: CVE-2025-47786

No data.