First published: Fri Jan 06 2023(Updated: )
A vulnerability was found in Piwigo-Guest-Book up to 1.3.0. It has been declared as critical. This vulnerability affects unknown code of the file include/guestbook.inc.php of the component Navigation Bar. The manipulation of the argument start leads to sql injection. Upgrading to version 1.3.1 is able to address this issue. The patch is identified as 0cdd1c388edf15089c3a7541cefe7756e560581d. It is recommended to upgrade the affected component. VDB-217582 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Guestbook | <1.3.1 | |
<1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-125053 is critical, with a severity value of 9.8.
The component affected by CVE-2014-125053 is the Navigation Bar.
CVE-2014-125053 manifests as an SQL injection vulnerability in the file include/guestbook.inc.php.
The recommended action to fix CVE-2014-125053 is to upgrade to version 1.3.1 of Piwigo-Guest-Book.
You can find more information about CVE-2014-125053 at the following references: [Link 1](https://github.com/Piwigo/Piwigo-Guest-Book/commit/0cdd1c388edf15089c3a7541cefe7756e560581d), [Link 2](https://github.com/Piwigo/Piwigo-Guest-Book/releases/tag/1.3.1), [Link 3](https://vuldb.com/?ctiid.217582)