cvelist/2025/47xxx/CVE-2025-47787.json

73 lines
2.6 KiB
JSON
Raw Normal View History

2025-05-09 20:00:37 +00:00
{
2025-05-15 20:00:32 +00:00
"data_version": "4.0",
2025-05-09 20:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2025-47787",
2025-05-15 20:00:32 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2025-05-09 20:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2025-05-15 20:00:32 +00:00
"value": "Emlog is an open source website building system. Emlog Pro prior to version 2.5.10 contains a file upload vulnerability. The store.php component contains a critical security flaw where it fails to properly validate the contents of remotely downloaded ZIP plugin files. This insufficient validation allows attackers to execute arbitrary code on the vulnerable system. Version 2.5.10 contains a patch for the issue."
2025-05-09 20:00:37 +00:00
}
]
2025-05-15 20:00:32 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-434: Unrestricted Upload of File with Dangerous Type",
"cweId": "CWE-434"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "emlog",
"product": {
"product_data": [
{
"product_name": "emlog",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "< 2.5.10"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/emlog/emlog/security/advisories/GHSA-4mcj-8gvh-p753",
"refsource": "MISC",
"name": "https://github.com/emlog/emlog/security/advisories/GHSA-4mcj-8gvh-p753"
},
{
"url": "https://github.com/emlog/emlog/commit/691c13e90df2fb35e120f4e0735078bad018eed7",
"refsource": "MISC",
"name": "https://github.com/emlog/emlog/commit/691c13e90df2fb35e120f4e0735078bad018eed7"
}
]
},
"source": {
"advisory": "GHSA-4mcj-8gvh-p753",
"discovery": "UNKNOWN"
2025-05-09 20:00:37 +00:00
}
}