ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.
Metrics
Affected Vendors & Products
References
History
Mon, 10 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elog Project
Elog Project elog |
|
| CPEs | cpe:2.3:a:elog_project:elog:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Elog Project
Elog Project elog |
Tue, 04 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elog
Elog elog |
|
| Vendors & Products |
Elog
Elog elog |
Fri, 31 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text. | |
| Title | ELOG file upload stored XSS | |
| Weaknesses | CWE-434 CWE-79 CWE-836 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-10-31T18:31:06.652Z
Updated: 2025-11-04T15:58:06.636Z
Reserved: 2025-10-16T19:38:59.151Z
Link: CVE-2025-62618
Updated: 2025-11-04T15:58:03.473Z
Status : Analyzed
Published: 2025-10-31T19:15:50.753
Modified: 2025-11-10T16:46:45.617
Link: CVE-2025-62618
No data.