First published: Fri Apr 21 2023(Updated: )
SQL injection vulnerability found in Piwigo v.13.5.0 and before allows a remote attacker to execute arbitrary code via the filter_user_id parameter to the admin.php?page=history&filter_image_id=&filter_user_id endpoint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Piwigo Piwigo | <=13.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26876 is a SQL injection vulnerability found in Piwigo v.13.5.0 and before.
CVE-2023-26876 allows a remote attacker to execute arbitrary code in Piwigo via the filter_user_id parameter.
CVE-2023-26876 has a severity rating of 8.8 (high).
To fix CVE-2023-26876 in Piwigo, make sure to update to a version higher than 13.5.0.
You can find more information about CVE-2023-26876 in the following references: [1](http://packetstormsecurity.com/files/172059/Piwigo-13.5.0-SQL-Injection.html), [2](http://seclists.org/fulldisclosure/2023/Apr/13), [3](https://gist.github.com/rodnt/a190d14d1715890d8df19bad58b90693).