CVE-2024-12842

MEDIUM

Emlog < 2.4.1 - Code Injection

Title source: rule
STIX 2.1

Description

A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.289078
Permissions Required, Third Party Advisory, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.289078
Exploit, Issue Tracking exploit issue-tracking
https://github.com/emlog/emlog/issues/305

Scores

CVSS v3 4.3
EPSS 0.0014
EPSS Percentile 34.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-94 CWE-79
Status published
Products (1)
emlog/emlog < 2.4.1
Published Dec 20, 2024
Tracked Since Feb 18, 2026