Description
Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability exists in the pwg.users.getList Web Service API method. The filter parameter is directly concatenated into a SQL query without proper sanitization, allowing authenticated administrators to execute arbitrary SQL commands. This issue has been patched in version 16.3.0.
Problem types
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
References
github.com/...Piwigo/security/advisories/GHSA-5jwg-cr5q-vjq2
github.com/...Piwigo/security/advisories/GHSA-5jwg-cr5q-vjq2
github.com/...ommit/9df471f16243371dc3725c5262e1632d23c8218a