FKIE_CVE-2025-53925
Vulnerability from fkie_nvd - Published: 2025-07-16 15:15 - Updated: 2025-08-14 20:38
Severity ?
Summary
Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows authenticated remote attackers to inject arbitrary web script or HTML via the file upload functionality. As an authenticated user it is possible to upload an .svg file that contains JavaScript code that is later executed. As of time of publication, no known patched versions exist.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9 | Exploit, Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9 | Exploit, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "1EFAF54A-ED0B-426F-9128-643A8184191F",
"versionEndIncluding": "2.5.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows authenticated remote attackers to inject arbitrary web script or HTML via the file upload functionality. As an authenticated user it is possible to upload an .svg file that contains JavaScript code that is later executed. As of time of publication, no known patched versions exist."
},
{
"lang": "es",
"value": "Emlog es un sistema de creaci\u00f3n de sitios web de c\u00f3digo abierto. Una vulnerabilidad de cross-site scripting (XSS) en emlog, hasta la versi\u00f3n pro-2.5.17 incluida, permite a atacantes remotos autenticados inyectar c\u00f3digo web o HTML arbitrario mediante la funci\u00f3n de carga de archivos. Como usuario autenticado, es posible cargar un archivo .svg que contiene c\u00f3digo JavaScript y que posteriormente se ejecuta. Al momento de la publicaci\u00f3n, no se conoc\u00edan versiones parcheadas."
}
],
"id": "CVE-2025-53925",
"lastModified": "2025-08-14T20:38:06.180",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-07-16T15:15:32.633",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…