CVE-2025-64349

8.8 HIGH

📋 TL;DR

CVE-2025-64349 is an access control vulnerability in ELOG that allows authenticated users to modify other users' profiles. An attacker can change a target user's email address, trigger a password reset, and hijack their account. This affects all ELOG installations with multiple user accounts.

💻 Affected Systems

Products:
  • ELOG
Versions: All versions prior to the fix commits
Operating Systems: All platforms running ELOG
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access. Self-registration is disabled by default, but existing user accounts are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of any user, including administrators, leading to data theft, privilege escalation, and system compromise.

🟠

Likely Case

Targeted account hijacking of regular users for credential theft, data access, or lateral movement within the system.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and multi-factor authentication in place.

🌐 Internet-Facing: HIGH if ELOG is exposed to the internet with authenticated user access.
🏢 Internal Only: HIGH for internal networks where users have ELOG accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions containing commits 7092ff64f6eb9521f8cc8c52272a020bf3730946 and f81e5695c40997322fe2713bfdeba459d9de09dc

Vendor Advisory: https://www.cve.org/CVERecord?id=CVE-2025-64349

Restart Required: Yes

Instructions:

1. Update ELOG to version containing the fix commits. 2. Restart the ELOG service. 3. Verify the patch is applied by checking the commit hash.

🔧 Temporary Workarounds

Restrict User Permissions

all

Temporarily restrict user permissions to prevent profile modifications

# Review and modify ELOG user configuration files to limit profile edit capabilities

Disable Password Reset Function

all

Temporarily disable password reset functionality

# Modify ELOG configuration to disable password reset emails

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual profile modification activity
  • Enable multi-factor authentication for all user accounts

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can modify other users' email addresses via the profile edit function

Check Version:

git log --oneline | grep -E '7092ff64f6eb9521f8cc8c52272a020bf3730946|f81e5695c40997322fe2713bfdeba459d9de09dc'

Verify Fix Applied:

Verify the fix commits are present in your ELOG installation and test that profile modifications are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual profile modification events
  • Multiple password reset requests for the same account
  • Email address changes followed by password resets

Network Indicators:

  • Unusual patterns of profile edit API calls
  • Multiple password reset email triggers

SIEM Query:

source="elog.log" AND (event="profile_edit" OR event="password_reset") | stats count by user, target_user

🔗 References

📤 Share & Export