CVE-2025-62717

Emlog is an open source website building system. In version 2.5.23, Emlog Pro is vulnerable to a session verification code error due to a clearing logic error. This means the verification code could be reused anywhere an email verification code is required. This issue has been fixed in commit 1f726df.
Configurations

Configuration 1 (hide)

cpe:2.3:a:emlog:emlog:2.5.23:*:*:*:pro:*:*:*

History

28 Oct 2025, 14:15

Type Values Removed Values Added
First Time Emlog
Emlog emlog
References () https://github.com/emlog/emlog/commit/1f726df0ce56a1bc6e8225dd95389974173bd0c0 - () https://github.com/emlog/emlog/commit/1f726df0ce56a1bc6e8225dd95389974173bd0c0 - Patch
References () https://github.com/emlog/emlog/security/advisories/GHSA-wwj4-ppfj-hcm6 - () https://github.com/emlog/emlog/security/advisories/GHSA-wwj4-ppfj-hcm6 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:emlog:emlog:2.5.23:*:*:*:pro:*:*:*

24 Oct 2025, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-24 21:16

Updated : 2025-10-28 14:15


NVD link : CVE-2025-62717

Mitre link : CVE-2025-62717

CVE.ORG link : CVE-2025-62717


JSON object : View

Products Affected

emlog

  • emlog
CWE
CWE-287

Improper Authentication

NVD-CWE-noinfo