Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* |
Mon, 20 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Emlog
Emlog emlog |
|
| Vendors & Products |
Emlog
Emlog emlog |
Fri, 10 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Emlog is an open source website building system. Emlog Pro versions 2.5.19 and earlier are vulnerable to Cross‑Site Request Forgery (CSRF) on the password change endpoint. An attacker can trick a logged‑in administrator into submitting a crafted POST request to change the admin password without consent. Impact is account takeover of privileged users. Severity: High. As of time of publication, no known patched versions exist. | |
| Title | Emlog Pro has CSRF issue that Enables Admin Password Reset | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-10T20:44:48.803Z
Reserved: 2025-10-03T22:21:59.617Z
Link: CVE-2025-61930
Updated: 2025-10-10T20:44:44.972Z
Status : Analyzed
Published: 2025-10-10T20:15:38.803
Modified: 2025-10-20T16:47:37.100
Link: CVE-2025-61930
No data.
OpenCVE Enrichment
Updated: 2025-10-20T16:17:13Z