CVE-2025-30372
📋 TL;DR
Emlog Pro versions 2.5.7 and 2.5.8 contain an SQL injection vulnerability in search_controller.php due to improper input sanitization. Attackers can bypass addslashes protection using URL double encoding to execute arbitrary SQL queries. This affects all websites running vulnerable Emlog Pro versions.
💻 Affected Systems
- Emlog Pro
📦 What is this software?
Emlog by Emlog
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including user credentials, personal data, and administrative access leading to full system takeover.
Likely Case
Extraction of sensitive user information like usernames, email addresses, and potentially hashed passwords from the database.
If Mitigated
Limited information disclosure if database permissions are properly restricted and WAF blocks SQL injection patterns.
🎯 Exploit Status
Vulnerability is in public advisory with technical details. SQL injection via search parameter manipulation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: pro-2.5.9
Vendor Advisory: https://github.com/emlog/emlog/security/advisories/GHSA-w6xc-r6x5-m77c
Restart Required: No
Instructions:
1. Backup your Emlog Pro installation and database. 2. Download pro-2.5.9 from official Emlog sources. 3. Replace all files with the new version. 4. Verify the search functionality works correctly.
🔧 Temporary Workarounds
WAF Rule Implementation
allDeploy web application firewall rules to block SQL injection patterns and URL double encoding attempts.
Search Function Restriction
allTemporarily disable or restrict access to search functionality until patching is complete.
🧯 If You Can't Patch
- Implement strict input validation and parameterized queries in search_controller.php
- Deploy database-level protections including minimal privilege accounts and query logging
🔍 How to Verify
Check if Vulnerable:
Check Emlog Pro admin panel for version number. If version is pro-2.5.7 or pro-2.5.8, the system is vulnerable.
Check Version:
Check Emlog admin dashboard or examine /content/config.php for version information
Verify Fix Applied:
After updating, confirm version shows pro-2.5.9 in admin panel and test search functionality with various inputs.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed search attempts with encoded parameters
- Database queries with unusual syntax from web server IP
Network Indicators:
- HTTP requests to search endpoints with URL-encoded %25 sequences
- Abnormal parameter patterns in GET/POST requests to search functionality
SIEM Query:
source="web_logs" AND (uri_path="*search*" OR uri_query="*search*") AND (uri_query MATCHES "%25[0-9a-fA-F]{2}%25" OR status_code=500)