CVE-2024-12844

MEDIUM

Emlog < 2.4.1 - Code Injection

Title source: rule
STIX 2.1

Description

A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.1. Affected is an unknown function of the file /admin/store.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

References (4)

Core 4
Core References
Permissions Required vdb-entry technical-description
https://vuldb.com/?id.289080
Permissions Required signature permissions-required
https://vuldb.com/?ctiid.289080
Third Party Advisory third-party-advisory
https://vuldb.com/?submit.462465
Exploit, Issue Tracking, Third Party Advisory exploit issue-tracking
https://github.com/emlog/emlog/issues/305

Scores

CVSS v3 4.3
EPSS 0.0019
EPSS Percentile 40.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-94 CWE-79
Status published
Products (1)
emlog/emlog < 2.4.1
Published Dec 20, 2024
Tracked Since Feb 18, 2026