No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Piwigo
Piwigo piwigo |
|
| Vendors & Products |
Piwigo
Piwigo piwigo |
Mon, 06 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the four date filter parameters (f_min_date_available, f_max_date_available, f_min_date_created, f_max_date_created) in ws_std_image_sql_filter() are concatenated directly into SQL without any escaping or type validation. This could result in an unauthenticated attacker reading the full database, including user password hashes. This issue has been patched in version 16.3.0. | |
| Title | Piwigo: Pre-auth SQL injection via date filter parameters in ws_std_image_sql_filter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T13:13:42.809Z
Reserved: 2026-02-20T22:02:30.028Z
Link: CVE-2026-27634
Updated: 2026-04-06T13:13:38.241Z
Status : Analyzed
Published: 2026-04-03T22:16:25.720
Modified: 2026-04-09T21:14:23.150
Link: CVE-2026-27634
No data.
OpenCVE Enrichment
Updated: 2026-04-06T22:22:02Z