{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5119","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-23T15:54:47.130Z","datePublished":"2025-05-23T21:00:11.879Z","dateUpdated":"2025-05-23T21:15:46.805Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-23T21:00:11.879Z"},"title":"Emlog Pro api_controller.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Emlog","product":"Pro","versions":[{"version":"2.5.11","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Emlog Pro 2.5.11 and classified as critical. This vulnerability affects unknown code of the file /include/controller/api_controller.php. The manipulation of the argument tag leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure and confirmed the existence of the vulnerability."},{"lang":"de","value":"In Emlog Pro 2.5.11 wurde eine kritische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /include/controller/api_controller.php. Durch das Beeinflussen des Arguments tag mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-05-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-23T18:00:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"joke_umbrella (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.310198","name":"VDB-310198 | Emlog Pro api_controller.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.310198","name":"VDB-310198 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.555822","name":"Submit #555822 | emlog Emlog Pro 2.5.11 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/404heihei/CVE/issues/5","tags":["exploit","issue-tracking"]}]},"adp":[{"references":[{"url":"https://github.com/404heihei/CVE/issues/5","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-23T21:15:04.312709Z","id":"CVE-2025-5119","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-23T21:15:46.805Z"}}]}}