mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
73 lines
2.6 KiB
JSON
73 lines
2.6 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2025-47787",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Emlog is an open source website building system. Emlog Pro prior to version 2.5.10 contains a file upload vulnerability. The store.php component contains a critical security flaw where it fails to properly validate the contents of remotely downloaded ZIP plugin files. This insufficient validation allows attackers to execute arbitrary code on the vulnerable system. Version 2.5.10 contains a patch for the issue."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-434: Unrestricted Upload of File with Dangerous Type",
|
|
"cweId": "CWE-434"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "emlog",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "emlog",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "< 2.5.10"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/emlog/emlog/security/advisories/GHSA-4mcj-8gvh-p753",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/emlog/emlog/security/advisories/GHSA-4mcj-8gvh-p753"
|
|
},
|
|
{
|
|
"url": "https://github.com/emlog/emlog/commit/691c13e90df2fb35e120f4e0735078bad018eed7",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/emlog/emlog/commit/691c13e90df2fb35e120f4e0735078bad018eed7"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-4mcj-8gvh-p753",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |