Vulnerability Description
Emlog is an open source website building system. In versions 2.5.21 and below, an HTML template injection allows stored cross‑site scripting (XSS) via the mail template settings. Once a malicious payload is saved, any subsequent visit to the settings page in an authenticated admin context will execute attacker‑controlled JavaScript, enabling session/token theft and full admin account takeover. This issue is fixed in version 2.5.22.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emlog | Emlog | <= 2.5.19 |
Related Weaknesses (CWE)
References
- https://github.com/emlog/emlog/pull/179Patch
- https://github.com/emlog/emlog/security/advisories/GHSA-hj97-hp2c-6m4mExploitThird Party Advisory
FAQ
What is CVE-2025-61597?
CVE-2025-61597 is a vulnerability with a CVSS score of 7.6 (HIGH). Emlog is an open source website building system. In versions 2.5.21 and below, an HTML template injection allows stored cross‑site scripting (XSS) via the mail template settings. Once a malicious payl...
How severe is CVE-2025-61597?
CVE-2025-61597 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-61597?
Check the references section above for vendor advisories and patch information. Affected products include: Emlog Emlog.