Home

Description

Emlog is an open source website building system. In versions 2.6.2 and prior, a SQL injection vulnerability exists in include/model/tag_model.php at line 168. The updateTagName() function directly interpolates user input into the SQL query string without using parameterized queries or proper escaping ($this->db->escape_string()), making it vulnerable to SQL injection attacks. At time of publication, there are no publicly available patches.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-03 | Updated 2026-04-06 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

<= 2.6.2
affected

References

github.com/.../emlog/security/advisories/GHSA-32mg-33qq-p3gf

cve.org (CVE-2026-34788)

nvd.nist.gov (CVE-2026-34788)

Download JSON