Description
A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.289078
Permissions Required, Third Party Advisory, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.289078
Exploit, Issue Tracking exploit
issue-tracking
https://github.com/emlog/emlog/issues/305
Scores
CVSS v3
4.3
EPSS
0.0014
EPSS Percentile
34.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-94
CWE-79
Status
published
Products (1)
emlog/emlog
< 2.4.1
Published
Dec 20, 2024
Tracked Since
Feb 18, 2026