Emlog is an open source website building system. Versions up to and including 2.5.19 are vulnerable to server-side Out-of-Band (OOB) requests / SSRF via uploaded SVG files. An attacker can upload a crafted SVG to http[:]//emblog/admin/media[.]php which contains external resource references. When the server processes/renders the SVG (thumbnailing, preview, or sanitization), it issues an HTTP request to the attacker-controlled host. Impact: server-side SSRF/OOB leading to internal network probing and potential metadata/credential exposure. As of time of publication, no known patched versions are available.
References
| Link | Resource |
|---|---|
| https://github.com/emlog/emlog/security/advisories/GHSA-6rwr-c8hc-mjj4 | Exploit Vendor Advisory |
Configurations
History
16 Jan 2026, 18:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/emlog/emlog/security/advisories/GHSA-6rwr-c8hc-mjj4 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
| First Time |
Emlog emlog
Emlog |
02 Jan 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-02 19:15
Updated : 2026-01-16 18:11
NVD link : CVE-2026-21433
Mitre link : CVE-2026-21433
CVE.ORG link : CVE-2026-21433
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-918
Server-Side Request Forgery (SSRF)
