A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local access. The exploit has been made public and could be used.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian email Logging Interface
CPEs cpe:2.3:a:fabian:email_logging_interface:2.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian email Logging Interface

Mon, 17 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 15 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects email Logging Interface
Vendors & Products Code-projects
Code-projects email Logging Interface

Sat, 15 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Email Logging Interface 2.0. Affected is an unknown function of the file signup.cpp. The manipulation of the argument Username results in path traversal: '../filedir'. The attack is only possible with local access. The exploit has been made public and could be used.
Title code-projects Email Logging Interface signup.cpp path traversal
Weaknesses CWE-23
CWE-24
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-11-17T18:54:33.761Z

Reserved: 2025-11-14T16:16:24.885Z

Link: CVE-2025-13199

cve-icon Vulnrichment

Updated: 2025-11-17T18:54:29.806Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-15T11:15:55.110

Modified: 2025-11-19T19:41:46.787

Link: CVE-2025-13199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-15T22:07:21Z

Weaknesses