Emlog is an open source website building system. Emlog Pro versions 2.5.19 and earlier are vulnerable to Cross‑Site Request Forgery (CSRF) on the password change endpoint. An attacker can trick a logged‑in administrator into submitting a crafted POST request to change the admin password without consent. Impact is account takeover of privileged users. Severity: High. As of time of publication, no known patched versions exist.
History

Fri, 10 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Description Emlog is an open source website building system. Emlog Pro versions 2.5.19 and earlier are vulnerable to Cross‑Site Request Forgery (CSRF) on the password change endpoint. An attacker can trick a logged‑in administrator into submitting a crafted POST request to change the admin password without consent. Impact is account takeover of privileged users. Severity: High. As of time of publication, no known patched versions exist.
Title Emlog Pro has CSRF issue that Enables Admin Password Reset
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-10T20:44:48.803Z

Reserved: 2025-10-03T22:21:59.617Z

Link: CVE-2025-61930

cve-icon Vulnrichment

Updated: 2025-10-10T20:44:44.972Z

cve-icon NVD

Status : Received

Published: 2025-10-10T20:15:38.803

Modified: 2025-10-10T20:15:38.803

Link: CVE-2025-61930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.