CVE-2026-34788 PUBLISHED

Emlog: SQL Injection in tag_model::updateTagName() via unsanitized parameters

Assigner: GitHub_M
Reserved: 30.03.2026 Published: 03.04.2026 Updated: 03.04.2026

Emlog is an open source website building system. In versions 2.6.2 and prior, a SQL injection vulnerability exists in include/model/tag_model.php at line 168. The updateTagName() function directly interpolates user input into the SQL query string without using parameterized queries or proper escaping ($this->db->escape_string()), making it vulnerable to SQL injection attacks. At time of publication, there are no publicly available patches.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 6.5

Product Status

Vendor emlog
Product emlog
Versions
  • Version <= 2.6.2 is affected

References

Problem Types

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE