Home

Description

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the four date filter parameters (f_min_date_available, f_max_date_available, f_min_date_created, f_max_date_created) in ws_std_image_sql_filter() are concatenated directly into SQL without any escaping or type validation. This could result in an unauthenticated attacker reading the full database, including user password hashes. This issue has been patched in version 16.3.0.

PUBLISHED Reserved 2026-02-20 | Published 2026-04-03 | Updated 2026-04-06 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 16.3.0
affected

References

github.com/...Piwigo/security/advisories/GHSA-mgqc-3445-qghq

github.com/...ommit/0d5ed1f7778bbe263410446d8cf64594df75bd08

piwigo.org/release-16.3.0

cve.org (CVE-2026-27634)

nvd.nist.gov (CVE-2026-27634)

Download JSON