Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 09 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Piwigo
Piwigo piwigo |
|
| Vendors & Products |
Piwigo
Piwigo piwigo |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability exists in the pwg.users.getList Web Service API method. The filter parameter is directly concatenated into a SQL query without proper sanitization, allowing authenticated administrators to execute arbitrary SQL commands. This issue has been patched in version 16.3.0. | |
| Title | Piwigo: SQL Injection in pwg.users.getList API Method via filter Parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T15:42:28.113Z
Reserved: 2026-02-24T02:32:39.800Z
Link: CVE-2026-27834
Updated: 2026-04-06T15:38:14.278Z
Status : Analyzed
Published: 2026-04-03T22:16:26.013
Modified: 2026-04-09T21:15:01.457
Link: CVE-2026-27834
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:45:37Z