Show filters
88 Total Results
Displaying 1-10 of 88
Sort by:
Attacker Value
Unknown
CVE-2023-51790
Disclosure Date: January 12, 2024 (last updated January 19, 2024)
Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component.
0
Attacker Value
Unknown
CVE-2023-44393
Disclosure Date: October 09, 2023 (last updated October 14, 2023)
Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the…
0
Attacker Value
Unknown
CVE-2023-37270
Disclosure Date: July 07, 2023 (last updated October 08, 2023)
Piwigo is open source photo gallery software. Prior to version 13.8.0, there is a SQL Injection vulnerability in the login of the administrator screen. The SQL statement that acquires the HTTP Header `User-Agent` is vulnerable at the endpoint that records user information when logging in to the administrator screen. It is possible to execute arbitrary SQL statements. Someone who wants to exploit the vulnerability must be log in to the administrator screen, even with low privileges. Any SQL statement can be executed. Doing so may leak information from the database. Version 13.8.0 contains a fix for this issue. As another mitigation, those who want to execute a SQL statement verbatim with user-enterable parameters should be sure to escape the parameter contents appropriately.
0
Attacker Value
Unknown
CVE-2023-34626
Disclosure Date: June 15, 2023 (last updated October 08, 2023)
Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function.
0
Attacker Value
Unknown
CVE-2023-33362
Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Piwigo 13.6.0 is vulnerable to SQL Injection via in the "profile" function.
0
Attacker Value
Unknown
CVE-2023-33361
Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php.
0
Attacker Value
Unknown
CVE-2023-33359
Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function.
0
Attacker Value
Unknown
CVE-2023-27233
Disclosure Date: May 17, 2023 (last updated October 08, 2023)
Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php.
0
Attacker Value
Unknown
CVE-2023-26876
Disclosure Date: April 21, 2023 (last updated October 08, 2023)
SQL injection vulnerability found in Piwigo v.13.5.0 and before allows a remote attacker to execute arbitrary code via the filter_user_id parameter to the admin.php?page=history&filter_image_id=&filter_user_id endpoint.
0
Attacker Value
Unknown
CVE-2022-48007
Disclosure Date: January 27, 2023 (last updated October 08, 2023)
A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent.
0