A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/emlog/emlog/issues/309 | Exploit Issue Tracking |
https://github.com/emlog/emlog/issues/309#issue-2755317359 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.290206 | Permissions Required VDB Entry |
https://vuldb.com/?id.290206 | Permissions Required VDB Entry |
https://vuldb.com/?submit.467912 | Third Party Advisory VDB Entry |
Configurations
History
25 Feb 2025, 22:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* |
25 Feb 2025, 22:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:* | |
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | () https://github.com/emlog/emlog/issues/309 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.290206 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.290206 - Permissions Required, VDB Entry | |
References | () https://github.com/emlog/emlog/issues/309#issue-2755317359 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?submit.467912 - Third Party Advisory, VDB Entry | |
First Time |
Emlog emlog
Emlog |
05 Jan 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-05 05:15
Updated : 2025-02-25 22:49
NVD link : CVE-2024-13132
Mitre link : CVE-2024-13132
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')