๐Ÿ” CVE Alert

CVE-2026-34228

UNKNOWN 0.0

Emlog: CSRF in Backend Upgrade Interface Leading to Arbitrary Remote SQL Execution and Arbitrary File Write

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
9th

Emlog is an open source website building system. Prior to version 2.6.8, the backend upgrade interface accepts remote SQL and ZIP URLs via GET parameters. The server first downloads and executes the SQL file, then downloads the ZIP file and extracts it directly into the web root directory. This process does not validate a CSRF token. Therefore, an attacker only needs to trick an authenticated administrator into visiting a malicious link to achieve arbitrary SQL execution and arbitrary file write. This issue has been patched in version 2.6.8.

CWE CWE-352
Vendor emlog
Product emlog
Published Apr 3, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for emlog emlog

Be the first to know when new unknown vulnerabilities affecting emlog emlog are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

emlog / emlog
< 2.6.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/emlog/emlog/security/advisories/GHSA-2rcc-jg83-34vp github.com: https://github.com/emlog/emlog/commit/4c3b8f3486e2c9caafee38a5eedb3cd16f8c8d6f