<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Emlog — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/emlog/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 23:17:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/emlog/feed.xml" rel="self" type="application/rss+xml"/><item><title>Emlog Path Traversal Vulnerability Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-emlog-rce/</link><pubDate>Fri, 03 Apr 2026 23:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-emlog-rce/</guid><description>Emlog versions 2.6.2 and prior are vulnerable to path traversal via crafted ZIP uploads, allowing authenticated admins to write arbitrary files and achieve remote code execution.</description><content:encoded><![CDATA[<p>Emlog, an open-source website building system, is vulnerable to a critical path traversal vulnerability (CVE-2026-34607) affecting versions 2.6.2 and earlier. This flaw resides within the <code>emUnZip()</code> function located in <code>include/lib/common.php:793</code>. The vulnerability stems from the function&rsquo;s failure to sanitize ZIP entry names during extraction of ZIP archives, such as those used for plugin/template uploads or backup imports. An authenticated administrator can exploit this by uploading a specially crafted ZIP file containing entries with &ldquo;../&rdquo; sequences. This allows the attacker to write arbitrary files to the server&rsquo;s file system, potentially including PHP webshells, ultimately leading to Remote Code Execution (RCE). At the time of this writing, there are no publicly available patches to address this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates as an administrator in the Emlog application.</li>
<li>The attacker crafts a malicious ZIP archive containing a file with a path traversal sequence (e.g., <code>../../../../shell.php</code>).</li>
<li>The attacker uploads the crafted ZIP archive via a plugin/template upload or backup import feature.</li>
<li>The <code>emUnZip()</code> function is invoked, which extracts the contents of the ZIP archive.</li>
<li>Due to the lack of sanitization, the <code>extractTo()</code> function writes the malicious file to an arbitrary location on the server&rsquo;s filesystem, as dictated by the path traversal sequence.</li>
<li>The attacker uploads a PHP webshell to a publicly accessible directory.</li>
<li>The attacker accesses the uploaded PHP webshell through a web browser (e.g., <code>http://example.com/shell.php</code>).</li>
<li>The attacker executes arbitrary commands on the server via the webshell, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control over the affected Emlog server. This can lead to data breaches, website defacement, malware distribution, or further attacks against other systems on the network. Given that Emlog is used by numerous websites, the potential impact could be widespread, affecting potentially hundreds or thousands of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for Emlog as soon as they are released to address CVE-2026-34607.</li>
<li>Implement input validation and sanitization measures within the <code>emUnZip()</code> function to prevent path traversal attacks. Specifically, sanitize ZIP entry names before passing them to the <code>extractTo()</code> function.</li>
<li>Monitor web server logs for suspicious requests to PHP files in unusual directories (e.g., outside the webroot) after ZIP archive uploads, using the provided Sigma rule for webserver logs.</li>
<li>Implement the provided Sigma rule to detect process creation from web server processes to identify potential webshell execution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>remote-code-execution</category><category>emlog</category><category>web-application</category></item></channel></rss>