Untriaged
Permalink
CVE-2026-34607
7.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Emlog: Path Traversal in emUnZip() allows arbitrary file write leading to RCE
Emlog is an open source website building system. In versions 2.6.2 and prior, a path traversal vulnerability exists in the emUnZip() function (include/lib/common.php:793). When extracting ZIP archives (plugin/template uploads, backup imports), the function calls $zip->extractTo($path) without sanitizing ZIP entry names. An authenticated admin can upload a crafted ZIP containing entries with ../ sequences to write arbitrary files to the server filesystem, including PHP webshells, achieving Remote Code Execution (RCE). At time of publication, there are no publicly available patches.
References
-
https://github.com/emlog/emlog/security/advisories/GHSA-2jg8-rmhm-xv9m x_refsource_CONFIRM
Affected products
emlog
- ==<= 2.6.2
Matching in nixpkgs
pkgs.libsForQt5.ksystemlog
System log viewer
pkgs.kdePackages.ksystemlog
KDE SystemLog Application
pkgs.plasma5Packages.ksystemlog
System log viewer
Package maintainers
-
@ttuegel Thomas Tuegel <ttuegel@mailbox.org>
-
@K900 Ilya K. <me@0upti.me>
-
@NickCao Nick Cao <nickcao@nichi.co>
-
@LunNova Luna Nova <nixpkgs-maintainer@lunnova.dev>
-
@mjm Matt Moriarity <matt@mattmoriarity.com>
-
@ilya-fedin Ilya Fedin <fedin-ilja2010@ya.ru>
-
@SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com>
-
@peterhoeg Peter Hoeg <peter@hoeg.com>