CVE-2026-34228 in Emlog
Résumé (Anglaise)
Emlog is an open source website building system. Prior to version 2.6.8, the backend upgrade interface accepts remote SQL and ZIP URLs via GET parameters. The server first downloads and executes the SQL file, then downloads the ZIP file and extracts it directly into the web root directory. This process does not validate a CSRF token. Therefore, an attacker only needs to trick an authenticated administrator into visiting a malicious link to achieve arbitrary SQL execution and arbitrary file write. This issue has been patched in version 2.6.8.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Responsable
GitHub_M
Réserver
26/03/2026
Divulgation
04/04/2026
Statut
Confirmé
Entrées
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnérabilité | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 355268 | Emlog Backend Upgrade cross site request forgery | 352 | Non défini | Correctif officiel | CVE-2026-34228 |