TROYANOSYVIRUS
Retour aux CVEs

CVE-2025-62618

HIGH
8.0

Description

ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.

Details CVE

Score CVSS v3.18.0
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie10/31/2025
Derniere modification11/10/2025
Sourcenvd
Observations honeypot0

Produits affectes

elog_project:elog

Faiblesses (CWE)

CWE-79CWE-434CWE-836

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.