Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coppermine-gallery
Coppermine-gallery coppermine Photo Gallery |
|
| Vendors & Products |
Coppermine-gallery
Coppermine-gallery coppermine Photo Gallery |
Wed, 11 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Coppermine Photo Gallery in versions 1.6.09 through 1.6.27 is vulnerable to path traversal. Unauthenticated remote attacker is able to exploit a vulnerable endpoint and construct payloads that allow to read content of any file accessible by the the web server process.This issue was fixed in version 1.6.28. | |
| Title | Path Traversal in Coppermine Photo Gallery | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-03-11T15:52:08.010Z
Reserved: 2026-02-23T08:24:04.937Z
Link: CVE-2026-3013
Updated: 2026-03-11T15:51:58.736Z
Status : Deferred
Published: 2026-03-11T15:16:32.097
Modified: 2026-04-27T19:22:08.623
Link: CVE-2026-3013
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:55:33Z