CVE-2025-47786

MEDIUM

Emlog - XSS

Title source: rule
STIX 2.1

Description

Emlog is an open source website building system. Version 2.5.13 has a stored cross-site scripting vulnerability that allows any registered user to construct malicious JavaScript, inducing all website users to click. In `/admin/comment.php`, the parameter `perpage_num` is not validated and is directly stored in the `admin_commend_perpage_num` field of the `emlog_options` table in the database. Moreover, the output is not filtered, resulting in the direct output of malicious code. As of time of publication, it is unclear if a patch exists.

References (1)

Core 1
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/emlog/emlog/security/advisories/GHSA-82qc-9vg7-2c6c

Scores

CVSS v3 4.8
EPSS 0.0014
EPSS Percentile 33.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (1)
emlog/emlog 2.5.13
Published May 15, 2025
Tracked Since Feb 18, 2026