Description
Emlog is an open source website building system. In version 2.5.23, article creation functionality is vulnerable to cross-site request forgery (CSRF). This can lead to a user being forced to post an article with arbitrary, attacker-controlled content. This, when combined with stored cross-site scripting, leads to account takeover. As of time of publication, no known patched versions are available.
Published: 2026-01-02
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Account Takeover via CSRF chained with stored XSS
Action: Patch urgently
AI Analysis

Impact

The flaw lies in the article creation controller, which accepts a POST request without verifying a CSRF token. This permits an attacker to force a logged‑in user to submit an arbitrary article. When that article is stored and later rendered without sufficient output encoding, the payload executes as a script in the victim’s browser, enabling the attacker to hijack the account and perform arbitrary actions such as modifying content or resetting credentials. The combination of a request forgery with a storage vulnerability results in a direct account takeover path.

Affected Systems

The vulnerability affects Emlog version 2.5.23, specifically the Pro build as identified by the associated CPE string. Users running this exact version without the optional CSRF guard or input sanitization are exposed.

Risk and Exploitability

The CVSS v3 base score of 7.0 classifies the flaw as high severity, while the EPSS score of less than 1% indicates that publicly observed exploitation attempts are extremely rare. However, the attack requires the victim to be authenticated and to visit a crafted page, a scenario that is feasible for attackers with social engineering or click‑through malware capabilities. The flaw is not listed in the current KEV catalog, suggesting no widespread active exploitation at present. Nonetheless the risk of exploitation remains due to the simplicity of the trigger and the potentially severe consequences.

Generated by OpenCVE AI on April 18, 2026 at 08:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Add CSRF token validation to the article creation endpoint to ensure only legitimate form submissions are processed
  • Sanitize and escape all user‑submitted article content before rendering to prevent stored XSS attacks
  • If a quick custom patch is unattainable, disable the article creation feature for affected users until a secure version is deployed

Generated by OpenCVE AI on April 18, 2026 at 08:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 16 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:emlog:emlog:2.5.23:*:*:*:pro:*:*:*
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}


Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Emlog
Emlog emlog
Vendors & Products Emlog
Emlog emlog

Fri, 02 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description Emlog is an open source website building system. In version 2.5.23, article creation functionality is vulnerable to cross-site request forgery (CSRF). This can lead to a user being forced to post an article with arbitrary, attacker-controlled content. This, when combined with stored cross-site scripting, leads to account takeover. As of time of publication, no known patched versions are available.
Title Emlog: CSRF chained with stored XSS leads to ATO
Weaknesses CWE-352
CWE-79
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-05T20:38:09.299Z

Reserved: 2025-12-29T03:00:29.274Z

Link: CVE-2026-21430

cve-icon Vulnrichment

Updated: 2026-01-05T20:32:32.603Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T19:15:47.697

Modified: 2026-01-16T19:07:18.667

Link: CVE-2026-21430

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:45:41Z

Weaknesses