Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue.
                
            References
                    Configurations
                    History
                    14 Apr 2025, 14:49
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.8  | 
| References | () https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c - Exploit | |
| First Time | 
        
        Emlog emlog
         Emlog  | 
28 Mar 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c - | 
28 Mar 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-28 15:15
Updated : 2025-04-14 14:49
NVD link : CVE-2025-30372
Mitre link : CVE-2025-30372
CVE.ORG link : CVE-2025-30372
JSON object : View
Products Affected
                emlog
- emlog
 
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
