CVE-2024-12846

MEDIUM

Emlog < 2.4.1 - Code Injection

Title source: rule
STIX 2.1

Description

A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.289082
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.289082
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.462614
Exploit, Issue Tracking exploit issue-tracking
https://github.com/emlog/emlog/issues/307

Scores

CVSS v3 4.3
EPSS 0.0010
EPSS Percentile 27.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-94 CWE-79
Status published
Products (1)
emlog/emlog < 2.4.1
Published Dec 21, 2024
Tracked Since Feb 18, 2026