ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elog
Elog elog |
|
| Vendors & Products |
Elog
Elog elog |
Fri, 31 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text. | |
| Title | ELOG file upload stored XSS | |
| Weaknesses | CWE-434 CWE-79 CWE-836 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-10-31T18:31:06.652Z
Updated: 2025-11-04T15:58:06.636Z
Reserved: 2025-10-16T19:38:59.151Z
Link: CVE-2025-62618
Updated: 2025-11-04T15:58:03.473Z
Status : Awaiting Analysis
Published: 2025-10-31T19:15:50.753
Modified: 2025-11-04T15:41:31.450
Link: CVE-2025-62618
No data.