CVE-2025-53925
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-16

Last updated on: 2025-08-14

Assigner: GitHub, Inc.

Description
Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows authenticated remote attackers to inject arbitrary web script or HTML via the file upload functionality. As an authenticated user it is possible to upload an .svg file that contains JavaScript code that is later executed. As of time of publication, no known patched versions exist.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-16
Last Modified
2025-08-14
Generated
2026-05-07
AI Q&A
2025-07-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
emlog emlog to 2.5.17 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cross-site scripting (XSS) issue in Emlog up to version pro-2.5.17. Authenticated remote attackers can exploit the file upload functionality by uploading an .svg file containing malicious JavaScript code. When this file is later accessed, the embedded script executes, potentially compromising the website or user data.


How can this vulnerability impact me? :

The vulnerability allows attackers with authenticated access to inject and execute arbitrary scripts on the website. This can lead to unauthorized actions, data theft, session hijacking, or defacement of the website, impacting the integrity and security of the affected system.


What immediate steps should I take to mitigate this vulnerability?

Since no patched versions exist for this vulnerability, immediate mitigation steps include restricting or disabling the file upload functionality for authenticated users, especially blocking uploads of .svg files, and monitoring for any suspicious activity related to file uploads. Additionally, applying strict input validation and sanitization on uploaded files can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart