Emlog is an open source website building system. Versions 2.5.13 and prior have a deserialization vulnerability. A user who creates a carefully crafted nickname can cause `str_replace` to replace the value of `name_orig` with empty, causing deserialization to fail and return `false`. Commit 9643250802188b791419e3c2188577073256a8a2 fixes the issue.
History

Thu, 15 May 2025 19:30:00 +0000

Type Values Removed Values Added
Description Emlog is an open source website building system. Versions 2.5.13 and prior have a deserialization vulnerability. A user who creates a carefully crafted nickname can cause `str_replace` to replace the value of `name_orig` with empty, causing deserialization to fail and return `false`. Commit 9643250802188b791419e3c2188577073256a8a2 fixes the issue.
Title Emlog vulnerable to Deserialization of Untrusted Data
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 6.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-05-15T19:21:15.280Z

Updated: 2025-05-15T19:21:15.280Z

Reserved: 2025-05-09T19:49:35.621Z

Link: CVE-2025-47784

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-05-15T20:16:08.820

Modified: 2025-05-15T20:16:08.820

Link: CVE-2025-47784

cve-icon Redhat

No data.