CVE-2025-62618

8.0 HIGH
Published: October 31, 2025 Modified: November 10, 2025

Description

ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://elog.psi.ch/elog/download/RPMS/?C=M;O=D
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Product
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-304-01.json
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2025-62618
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.0 / 10.0
EPSS (Exploit Probability)
0.0%
14th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

elog_project