We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47785

EMLOG SQL Injection Vulnerability



Description

Emlog is an open source website building system. In versions up to and including 2.5.9, SQL injection occurs because the $origContent parameter in admin/article_save.php is not strictly filtered. Since admin/article_save.php can be accessed by ordinary registered users, this will cause SQL injection to occur when the registered site is enabled, resulting in the injection of the admin account and password, which is then exploited by the backend remote code execution. As of time of publication, it is unknown whether a fix exists.

Reserved 2025-05-09 | Published 2025-05-15 | Updated 2025-05-19 | Assigner GitHub_M


HIGH: 8.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

<= 2.5.9
affected

References

github.com/.../emlog/security/advisories/GHSA-939m-47f7-m559

cve.org (CVE-2025-47785)

nvd.nist.gov (CVE-2025-47785)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47785

Support options

Helpdesk Chat, Email, Knowledgebase