Home

Description

Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct this URL is taken from the HTTP request's Host header and is not validated at all. Therefore, an attacker can send a password-reset URL with a modified hostname to an existing user whose username or email the attacker knows or guesses. This issue has been patched in version 15.7.0.

PUBLISHED Reserved 2025-10-13 | Published 2025-11-18 | Updated 2025-11-19 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-640: Weak Password Recovery Mechanism for Forgotten Password

Product status

= 15.6.0
affected

References

github.com/...Piwigo/security/advisories/GHSA-9986-w7jf-33f6 exploit

github.com/...Piwigo/security/advisories/GHSA-9986-w7jf-33f6

github.com/...ommit/9d2565465efc3570963ff431b45cad21610f6692

cve.org (CVE-2025-62406)

nvd.nist.gov (CVE-2025-62406)

Download JSON