A Server-Side Request Forgery (SSRF) in the component sort.php of Emlog Pro v2.5.4 allows attackers to scan local and internal ports via supplying a crafted URL.
                
            References
                    | Link | Resource | 
|---|---|
| http://emlogpro.com | Not Applicable | 
| https://github.com/Ka7arotto/emlog/blob/main/ssrf.md | Broken Link | 
| https://www.emlog.net/ | Product | 
Configurations
                    History
                    07 Apr 2025, 18:52
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Emlog emlog
         Emlog  | 
|
| CPE | cpe:2.3:a:emlog:emlog:2.5.4:*:*:*:pro:*:*:* | |
| References | () http://emlogpro.com - Not Applicable | |
| References | () https://github.com/Ka7arotto/emlog/blob/main/ssrf.md - Broken Link | |
| References | () https://www.emlog.net/ - Product | 
06 Mar 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 6.8  | 
| Summary | 
        
        
  | 
|
| CWE | CWE-918 | 
26 Feb 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-26 15:15
Updated : 2025-04-07 18:52
NVD link : CVE-2025-25827
Mitre link : CVE-2025-25827
CVE.ORG link : CVE-2025-25827
JSON object : View
Products Affected
                emlog
- emlog
 
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
