CVE-2025-61930

HIGH

Emlog < 2.5.19 - CSRF

Title source: rule
STIX 2.1

Description

Emlog is an open source website building system. Emlog Pro versions 2.5.19 and earlier are vulnerable to Cross‑Site Request Forgery (CSRF) on the password change endpoint. An attacker can trick a logged‑in administrator into submitting a crafted POST request to change the admin password without consent. Impact is account takeover of privileged users. Severity: High. As of time of publication, no known patched versions exist.

References (1)

Core 1
Core References
Exploit, Mitigation, Vendor Advisory x_refsource_confirm
https://github.com/emlog/emlog/security/advisories/GHSA-m2qw-9wjx-qxm2

Scores

CVSS v3 8.1
EPSS 0.0003
EPSS Percentile 8.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-352
Status published
Products (1)
emlog/emlog < 2.5.19
Published Oct 10, 2025
Tracked Since Feb 18, 2026