Emlog is an open source website building system. In version 2.5.23, article creation functionality is vulnerable to cross-site request forgery (CSRF). This can lead to a user being forced to post an article with arbitrary, attacker-controlled content. This, when combined with stored cross-site scripting, leads to account takeover. As of time of publication, no known patched versions are available.
References
| Link | Resource |
|---|---|
| https://github.com/emlog/emlog/security/advisories/GHSA-2g2w-vmg7-pq4q | Exploit Vendor Advisory |
Configurations
History
16 Jan 2026, 19:07
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:emlog:emlog:2.5.23:*:*:*:pro:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.3 |
| References | () https://github.com/emlog/emlog/security/advisories/GHSA-2g2w-vmg7-pq4q - Exploit, Vendor Advisory | |
| First Time |
Emlog emlog
Emlog |
02 Jan 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-02 19:15
Updated : 2026-01-16 19:07
NVD link : CVE-2026-21430
Mitre link : CVE-2026-21430
CVE.ORG link : CVE-2026-21430
JSON object : View
Products Affected
emlog
- emlog
