{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-61769","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-09-30T19:43:49.900Z","datePublished":"2025-10-06T16:09:53.554Z","dateUpdated":"2025-10-06T17:16:13.290Z"},"containers":{"cna":{"title":"Emlog vulnerable to stored XSS in file upload functionality in emlog","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","baseScore":2.1,"baseSeverity":"LOW","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/emlog/emlog/security/advisories/GHSA-rrf5-pv68-gpjf","tags":["x_refsource_CONFIRM"],"url":"https://github.com/emlog/emlog/security/advisories/GHSA-rrf5-pv68-gpjf"},{"name":"https://github.com/emlog/emlog/commit/052f9c4226b2c0014bcd857fec47677340b185b1","tags":["x_refsource_MISC"],"url":"https://github.com/emlog/emlog/commit/052f9c4226b2c0014bcd857fec47677340b185b1"}],"affected":[{"vendor":"emlog","product":"emlog","versions":[{"version":"<= 2.5.22","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-10-06T16:09:53.554Z"},"descriptions":[{"lang":"en","value":"Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including version 2.5.22 allows authenticated remote attackers to inject arbitrary web script or HTML via the file upload functionality. As an authenticated user it is possible to upload .svg file that contains JavaScript code that is later being executed. Commit 052f9c4226b2c0014bcd857fec47677340b185b1 fixes the issue."}],"source":{"advisory":"GHSA-rrf5-pv68-gpjf","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/emlog/emlog/security/advisories/GHSA-rrf5-pv68-gpjf","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T17:00:49.327379Z","id":"CVE-2025-61769","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T17:16:13.290Z"}}]}}