Description
Emlog is an open source website building system. Versions 2.5.13 and prior have a deserialization vulnerability. A user who creates a carefully crafted nickname can cause `str_replace` to replace the value of `name_orig` with empty, causing deserialization to fail and return `false`. Commit 9643250802188b791419e3c2188577073256a8a2 fixes the issue.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://github.com/emlog/emlog/security/advisories/GHSA-f56g-m99v-mqc3
Patch x_refsource_misc
https://github.com/emlog/emlog/commit/9643250802188b791419e3c2188577073256a8a2
Scores
CVSS v3
9.8
EPSS
0.0076
EPSS Percentile
73.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-502
Status
published
Products (1)
emlog/emlog
< 2.5.14
Published
May 15, 2025
Tracked Since
Feb 18, 2026