Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists.
Metrics
Affected Vendors & Products
References
History
Thu, 15 May 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists. | |
Title | Emlog vulnerable to Stored Cross-site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-15T19:33:24.271Z
Updated: 2025-05-15T19:33:24.271Z
Reserved: 2025-05-09T19:49:35.621Z
Link: CVE-2025-47786

No data.

Status : Awaiting Analysis
Published: 2025-05-15T20:16:09.077
Modified: 2025-05-16T14:42:18.700
Link: CVE-2025-47786

No data.