Emlog is an open source website building system. Versions 2.5.13 and prior have a deserialization vulnerability. A user who creates a carefully crafted nickname can cause `str_replace` to replace the value of `name_orig` with empty, causing deserialization to fail and return `false`. Commit 9643250802188b791419e3c2188577073256a8a2 fixes the issue.
History

Fri, 18 Jul 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Emlog
Emlog emlog
CPEs cpe:2.3:a:emlog:emlog:*:*:*:*:-:*:*:*
Vendors & Products Emlog
Emlog emlog
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 16 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 19:30:00 +0000

Type Values Removed Values Added
Description Emlog is an open source website building system. Versions 2.5.13 and prior have a deserialization vulnerability. A user who creates a carefully crafted nickname can cause `str_replace` to replace the value of `name_orig` with empty, causing deserialization to fail and return `false`. Commit 9643250802188b791419e3c2188577073256a8a2 fixes the issue.
Title Emlog vulnerable to Deserialization of Untrusted Data
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 6.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-05-15T19:21:15.280Z

Updated: 2025-05-16T16:15:56.526Z

Reserved: 2025-05-09T19:49:35.621Z

Link: CVE-2025-47784

cve-icon Vulnrichment

Updated: 2025-05-16T16:15:51.354Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:16:08.820

Modified: 2025-07-18T15:49:22.207

Link: CVE-2025-47784

cve-icon Redhat

No data.