CVE-2026-34607 in Emlog
요약 (영어)
Emlog is an open source website building system. In versions 2.6.2 and prior, a path traversal vulnerability exists in the emUnZip() function (include/lib/common.php:793). When extracting ZIP archives (plugin/template uploads, backup imports), the function calls $zip->extractTo($path) without sanitizing ZIP entry names. An authenticated admin can upload a crafted ZIP containing entries with ../ sequences to write arbitrary files to the server filesystem, including PHP webshells, achieving Remote Code Execution (RCE). At time of publication, there are no publicly available patches.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
책임이 있는
GitHub_M
예약하다
2026. 03. 30.
공개
2026. 04. 04.
상태
확인됨
엔트리
VulDB provides additional information and datapoints for this CVE:
| 아이디 | 취약성 | CWE | 악용 | 대책 | CVE |
|---|---|---|---|---|---|
| 355246 | Emlog ZIP common.php emUnZip 디렉토리 순회 | 22 | 정의되지 않음 | 정의되지 않음 | CVE-2026-34607 |