CVE-2026-27885
Received Received - Intake
SQL Injection in Piwigo Activity List API Exposes Sensitive Data

Publication date: 2026-04-03

Last updated on: 2026-04-09

Assigner: GitHub, Inc.

Description
Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability was discovered in Piwigo affecting the Activity List API endpoint. This vulnerability allows an authenticated administrator to extract sensitive data from the database, including user credentials, email addresses, and all stored content. This issue has been patched in version 16.3.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
piwigo piwigo to 16.3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a SQL Injection issue in Piwigo, an open source photo gallery application. It affects the Activity List API endpoint in versions prior to 16.3.0. An authenticated administrator can exploit this vulnerability to extract sensitive data from the database.

  • The extracted data can include user credentials, email addresses, and all stored content.

The vulnerability has been fixed in version 16.3.0.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized access to sensitive information stored in the Piwigo database.

  • Exposure of user credentials could lead to account compromise.
  • Disclosure of email addresses may result in privacy violations or targeted attacks.
  • Access to all stored content could lead to data theft or loss of intellectual property.

Overall, it compromises confidentiality, integrity, and availability of the affected system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Piwigo to version 16.3.0 or later, where the SQL Injection issue in the Activity List API endpoint has been patched.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The SQL Injection vulnerability in Piwigo prior to version 16.3.0 allows an authenticated administrator to extract sensitive data from the database, including user credentials, email addresses, and all stored content.

Such unauthorized access and potential data exposure could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require the protection of personal and sensitive information.

Therefore, exploitation of this vulnerability may result in violations of these standards due to the compromise of confidentiality, integrity, and availability of sensitive data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart