Search Results (6 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-60936 2 Emoncms, Openenergymonitor 2 Emoncms, Emoncms 2025-10-28 6.1 Medium
Emoncms 11.7.3 is vulnerable to Cross Site in the input handling mechanism. This vulnerability allows authenticated attackers with API access to inject malicious JavaScript code that executes when administrators view the application logs.
CVE-2025-60938 2 Emoncms, Openenergymonitor 2 Emoncms, Emoncms 2025-10-28 7.5 High
Emoncms 11.7.3 has a remote code execution vulnerability in the firmware upload feature that allows authenticated users to execute arbitrary commands on the target system. The vulnerability stems from insufficient input validation of user-controlled parameters including filename, port, baud_rate, core, and autoreset within the /admin/upload-custom-firmware endpoint.
CVE-2025-22992 1 Openenergymonitor 1 Emoncms 2025-07-30 9.8 Critical
A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions.
CVE-2017-5964 1 Openenergymonitor 1 Emoncms 2025-04-20 6.1 Medium
An issue was discovered in Emoncms through 9.8.0. The vulnerability exists due to insufficient filtration of user-supplied data in multiple HTTP GET parameters passed to the "emoncms-master/Modules/vis/visualisations/compare.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
CVE-2021-26716 1 Openenergymonitor 1 Emoncms 2024-11-21 6.1 Medium
Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter.
CVE-2019-1010008 1 Openenergymonitor 1 Emoncms 2024-11-21 N/A
OpenEnergyMonitor Project Emoncms 9.8.8 is affected by: Cross Site Scripting (XSS). The impact is: Theoretically low, but might potentially enable persistent XSS (user could embed mal. code). The component is: Javascript code execution in "Name", "Location", "Bio" and "Starting Page" fields in the "My Account" page. File: Lib/listjs/list.js, line 67. The attack vector is: unknown, victim must open profile page if persistent was possible.