Home

Description

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability exists in the pwg.users.getList Web Service API method. The filter parameter is directly concatenated into a SQL query without proper sanitization, allowing authenticated administrators to execute arbitrary SQL commands. This issue has been patched in version 16.3.0.

PUBLISHED Reserved 2026-02-24 | Published 2026-04-03 | Updated 2026-04-06 | Assigner GitHub_M




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 16.3.0
affected

References

github.com/...Piwigo/security/advisories/GHSA-5jwg-cr5q-vjq2 exploit

github.com/...Piwigo/security/advisories/GHSA-5jwg-cr5q-vjq2

github.com/...ommit/9df471f16243371dc3725c5262e1632d23c8218a

piwigo.org/release-16.3.0

cve.org (CVE-2026-27834)

nvd.nist.gov (CVE-2026-27834)

Download JSON