CVE-2026-27885
SQL Injection in Piwigo Activity List API Exposes Sensitive Data
Publication date: 2026-04-03
Last updated on: 2026-04-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| piwigo | piwigo | to 16.3.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a SQL Injection issue in Piwigo, an open source photo gallery application. It affects the Activity List API endpoint in versions prior to 16.3.0. An authenticated administrator can exploit this vulnerability to extract sensitive data from the database.
- The extracted data can include user credentials, email addresses, and all stored content.
The vulnerability has been fixed in version 16.3.0.
How can this vulnerability impact me? :
This vulnerability can have serious impacts including unauthorized access to sensitive information stored in the Piwigo database.
- Exposure of user credentials could lead to account compromise.
- Disclosure of email addresses may result in privacy violations or targeted attacks.
- Access to all stored content could lead to data theft or loss of intellectual property.
Overall, it compromises confidentiality, integrity, and availability of the affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Piwigo to version 16.3.0 or later, where the SQL Injection issue in the Activity List API endpoint has been patched.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The SQL Injection vulnerability in Piwigo prior to version 16.3.0 allows an authenticated administrator to extract sensitive data from the database, including user credentials, email addresses, and all stored content.
Such unauthorized access and potential data exposure could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require the protection of personal and sensitive information.
Therefore, exploitation of this vulnerability may result in violations of these standards due to the compromise of confidentiality, integrity, and availability of sensitive data.