CVE-2026-21433

7.7 HIGH

📋 TL;DR

Emlog versions up to 2.5.19 are vulnerable to server-side request forgery (SSRF) via malicious SVG file uploads. Attackers can upload crafted SVG files that force the server to make HTTP requests to attacker-controlled hosts, potentially exposing internal network resources and credentials. This affects all Emlog installations with the vulnerable media upload functionality enabled.

💻 Affected Systems

Products:
  • Emlog
Versions: Up to and including 2.5.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires media upload functionality to be accessible, typically via admin interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full internal network reconnaissance, credential theft from metadata services, lateral movement to internal systems, and potential data exfiltration.

🟠

Likely Case

Internal network scanning, enumeration of internal services, and potential access to cloud metadata containing credentials.

🟢

If Mitigated

Limited to failed external requests if proper network segmentation and egress filtering are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to upload media files. The vulnerability is well-documented in the security advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://github.com/emlog/emlog/security/advisories/GHSA-6rwr-c8hc-mjj4

Restart Required: No

Instructions:

No official patch available. Monitor the Emlog GitHub repository for security updates and apply when released.

🔧 Temporary Workarounds

Disable SVG uploads

all

Modify media upload configuration to reject SVG files entirely

Modify admin/media.php to filter out .svg extensions before processing

Implement strict file validation

all

Add server-side validation to sanitize SVG content and remove external resource references

Implement XML parsing to remove <image>, <use>, <script> tags with external href/xlink:href attributes

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious SVG upload patterns
  • Restrict outbound network traffic from the web server to only necessary external services

🔍 How to Verify

Check if Vulnerable:

Check if running Emlog version 2.5.19 or earlier and test SVG upload with external resource references

Check Version:

Check emlog/version.php or admin interface for version information

Verify Fix Applied:

Test SVG upload functionality with malicious payloads and monitor for outbound requests

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads
  • Outbound HTTP requests from web server to unusual domains/IPs
  • Failed external resource fetches in web server logs

Network Indicators:

  • HTTP requests from web server to external domains following SVG uploads
  • DNS queries for attacker-controlled domains

SIEM Query:

source="web_server" AND (file_extension=".svg" OR uri_path="/admin/media.php")

🔗 References

📤 Share & Export