{"id":"CVE-2024-12846","details":"A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.","modified":"2026-04-10T05:08:30.975699Z","published":"2024-12-21T05:15:07.373Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.289082"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.462614"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.289082"},{"type":"REPORT","url":"https://github.com/emlog/emlog/issues/307"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/emlog/emlog","events":[{"introduced":"0"},{"fixed":"57cfb19cbed3d8ecc240d0e33913868577e5b51f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.4.1"}]}}],"versions":["5.3.1","6.0.0","6.1.0","ci","emlog_5.1.2","emlog_5.2.0","emlog_5.2.1","emlog_5.3.0","pro-1.0.1","pro-1.0.2","pro-1.0.3","pro-1.0.4","pro-1.0.5","pro-1.0.6","pro-1.0.7","pro-1.0.8","pro-1.1.0","pro-1.1.1","pro-1.2.0","pro-1.2.1","pro-1.2.2","pro-1.3.0","pro-1.3.1","pro-1.4.0","pro-1.5.0","pro-1.5.0.new","pro-1.5.1","pro-1.6.0","pro-1.7.0","pro-1.7.1","pro-1.8.0","pro-1.9.0","pro-1.9.1","pro-1.9.2","pro-1.9.3","pro-2.0.0","pro-2.0.1","pro-2.0.2","pro-2.0.3","pro-2.1.0","pro-2.1.1","pro-2.1.10","pro-2.1.11","pro-2.1.12","pro-2.1.13","pro-2.1.14","pro-2.1.15","pro-2.1.2","pro-2.1.3","pro-2.1.4","pro-2.1.5","pro-2.1.6","pro-2.1.7","pro-2.1.8","pro-2.1.9","pro-2.2.0","pro-2.2.1","pro-2.2.10","pro-2.2.11","pro-2.2.2","pro-2.2.3","pro-2.2.4","pro-2.2.5","pro-2.2.6","pro-2.2.7","pro-2.2.8","pro-2.2.9","pro-2.3.0","pro-2.3.1","pro-2.3.10","pro-2.3.11","pro-2.3.12","pro-2.3.13","pro-2.3.14","pro-2.3.15","pro-2.3.16","pro-2.3.17","pro-2.3.18","pro-2.3.2","pro-2.3.4","pro-2.3.5","pro-2.3.6","pro-2.3.7","pro-2.3.8","pro-2.3.9","pro-2.4.0","pro-test-01","pro-test-02"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-12846.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"}]}