Metrics
Affected Vendors & Products
No reference.
Thu, 08 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 CWE-434 |
|
| CPEs | ||
| References |
|
|
| Metrics |
cvssV2_0
|
Thu, 08 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Emlog Pro media.php unrestricted upload | |
| Metrics |
ssvc
|
Thu, 08 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Emlog Pro up to 2.5.18. This issue affects some unknown processing of the file /admin/media.php?action=upload&sid=0. Executing manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The file upload in include/service/media.php verifies the file extension based on a list defined in include/lib/option.php. This whitelist prevents unrestricted uploads (e.g. PHP files). Therefore, the attack possibility is just of theoretical nature. |
| Metrics |
cvssV3_0
|
cvssV2_0
|
Fri, 12 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* |
Thu, 21 Aug 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Emlog
Emlog emlog Emlog Pro Project Emlog Pro Project emlog Pro |
|
| Vendors & Products |
Emlog
Emlog emlog Emlog Pro Project Emlog Pro Project emlog Pro |
Wed, 20 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 Aug 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Emlog Pro up to 2.5.18. This issue affects some unknown processing of the file /admin/media.php?action=upload&sid=0. Executing manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Emlog Pro media.php unrestricted upload | |
| Weaknesses | CWE-284 CWE-434 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: REJECTED
Assigner: VulDB
Published: 2025-08-20T11:02:06.184Z
Updated: 2026-01-08T08:32:53.643Z
Reserved: 2025-08-19T13:54:01.653Z
Link: CVE-2025-9173
Updated:
Status : Rejected
Published: 2025-08-20T11:15:27.510
Modified: 2026-01-08T09:15:41.097
Link: CVE-2025-9173
No data.