CVE-2026-34788 in Emlog
要約 (英語)
Emlog is an open source website building system. In versions 2.6.2 and prior, a SQL injection vulnerability exists in include/model/tag_model.php at line 168. The updateTagName() function directly interpolates user input into the SQL query string without using parameterized queries or proper escaping ($this->db->escape_string()), making it vulnerable to SQL injection attacks. At time of publication, there are no publicly available patches.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
責任者
GitHub_M
予約する
2026年03月30日
公開
2026年04月04日
ステータス
確認済み
エントリ
VulDB provides additional information and datapoints for this CVE:
| 識別子 | 脆弱性 | CWE | 悪用可 | 対策 | CVE |
|---|---|---|---|---|---|
| 355249 | Emlog Query String tag_model.php updateTagName SQLインジェクション | 89 | 未定義 | 未定義 | CVE-2026-34788 |