CVE-2025-64349
📋 TL;DR
CVE-2025-64349 is an access control vulnerability in ELOG that allows authenticated users to modify other users' profiles. An attacker can change a target user's email address, trigger a password reset, and hijack their account. This affects all ELOG installations with multiple user accounts.
💻 Affected Systems
- ELOG
📦 What is this software?
Elog by Elog Project
⚠️ Risk & Real-World Impact
Worst Case
Complete account takeover of any user, including administrators, leading to data theft, privilege escalation, and system compromise.
Likely Case
Targeted account hijacking of regular users for credential theft, data access, or lateral movement within the system.
If Mitigated
Limited impact with proper access controls, monitoring, and multi-factor authentication in place.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions containing commits 7092ff64f6eb9521f8cc8c52272a020bf3730946 and f81e5695c40997322fe2713bfdeba459d9de09dc
Vendor Advisory: https://www.cve.org/CVERecord?id=CVE-2025-64349
Restart Required: Yes
Instructions:
1. Update ELOG to version containing the fix commits. 2. Restart the ELOG service. 3. Verify the patch is applied by checking the commit hash.
🔧 Temporary Workarounds
Restrict User Permissions
allTemporarily restrict user permissions to prevent profile modifications
# Review and modify ELOG user configuration files to limit profile edit capabilities
Disable Password Reset Function
allTemporarily disable password reset functionality
# Modify ELOG configuration to disable password reset emails
🧯 If You Can't Patch
- Implement strict access controls and monitor for unusual profile modification activity
- Enable multi-factor authentication for all user accounts
🔍 How to Verify
Check if Vulnerable:
Test if authenticated users can modify other users' email addresses via the profile edit function
Check Version:
git log --oneline | grep -E '7092ff64f6eb9521f8cc8c52272a020bf3730946|f81e5695c40997322fe2713bfdeba459d9de09dc'
Verify Fix Applied:
Verify the fix commits are present in your ELOG installation and test that profile modifications are properly restricted
📡 Detection & Monitoring
Log Indicators:
- Unusual profile modification events
- Multiple password reset requests for the same account
- Email address changes followed by password resets
Network Indicators:
- Unusual patterns of profile edit API calls
- Multiple password reset email triggers
SIEM Query:
source="elog.log" AND (event="profile_edit" OR event="password_reset") | stats count by user, target_user
🔗 References
- https://bitbucket.org/ritt/elog/commits/7092ff64f6eb9521f8cc8c52272a020bf3730946
- https://bitbucket.org/ritt/elog/commits/f81e5695c40997322fe2713bfdeba459d9de09dc
- https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-304-01.json
- https://www.cve.org/CVERecord?id=CVE-2025-64349