Description
Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows authenticated remote attackers to inject arbitrary web script or HTML via the siteurl parameter. It is possible to inject malicious code into siteurl parameter resulting in Stored XSS. When someone clicks on the link the malicious code is executed. As of time of publication, no known patched versions exist.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-53924, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-53924 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Cross-Site+Scripting
- https://capec.mitre.org/data/definitions/209.html
- https://capec.mitre.org/data/definitions/588.html
- https://capec.mitre.org/data/definitions/591.html
- https://capec.mitre.org/data/definitions/592.html
- https://capec.mitre.org/data/definitions/63.html
- https://capec.mitre.org/data/definitions/85.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-53924