{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-30372","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-03-21T14:12:06.272Z","datePublished":"2025-03-28T14:51:41.664Z","dateUpdated":"2025-03-28T15:43:43.798Z"},"containers":{"cna":{"title":"Emlog Pro contains an SQL injection vulnerability.","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c","tags":["x_refsource_CONFIRM"],"url":"https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c"}],"affected":[{"vendor":"emlog","product":"emlog","versions":[{"version":">= pro-2.5.7, < pro-2.5.9","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-03-28T14:51:41.664Z"},"descriptions":[{"lang":"en","value":"Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue."}],"source":{"advisory":"GHSA-w6xc-r6x5-m77c","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-28T15:42:43.532742Z","id":"CVE-2025-30372","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-28T15:43:43.798Z"}}]}}