FKIE_CVE-2025-53926
Vulnerability from fkie_nvd - Published: 2025-07-16 16:15 - Updated: 2025-08-14 20:37
Severity ?
Summary
Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows remote attackers to inject arbitrary web script or HTML via the comment and comname parameters. Reflected XSS requires the victim to send POST requests, therefore the victim must be persuaded into clicking into sent URL. As of time of publication, no known patched versions exist.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x | Exploit, Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x | Exploit, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "1EFAF54A-ED0B-426F-9128-643A8184191F",
"versionEndIncluding": "2.5.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows remote attackers to inject arbitrary web script or HTML via the comment and comname parameters. Reflected XSS requires the victim to send POST requests, therefore the victim must be persuaded into clicking into sent URL. As of time of publication, no known patched versions exist."
},
{
"lang": "es",
"value": "Emlog es un sistema de c\u00f3digo abierto para la creaci\u00f3n de sitios web. Una vulnerabilidad de cross-site scripting (XSS) en emlog, hasta la versi\u00f3n pro-2.5.17 incluida, permite a atacantes remotos inyectar c\u00f3digo web o HTML arbitrario mediante los par\u00e1metros comment y comname. El XSS reflejado requiere que la v\u00edctima env\u00ede solicitudes POST, por lo que debe ser persuadida para que haga clic en la URL enviada. Al momento de la publicaci\u00f3n, no se conoc\u00edan versiones parcheadas."
}
],
"id": "CVE-2025-53926",
"lastModified": "2025-08-14T20:37:42.590",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-07-16T16:15:27.677",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…