Filtered by vendor Piwigo
Subscriptions
Filtered by product Piwigo
Subscriptions
Total
95 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2015-2035 | 1 Piwigo | 1 Piwigo | 2025-04-12 | N/A |
SQL injection vulnerability in the administrative backend in Piwigo before 2.7.4 allows remote administrators to execute arbitrary SQL commands via the user parameter in the history page to admin.php. | ||||
CVE-2016-10085 | 1 Piwigo | 1 Piwigo | 2025-04-12 | N/A |
admin/languages.php in Piwigo through 2.8.3 allows remote authenticated administrators to conduct File Inclusion attacks via the tab parameter. | ||||
CVE-2016-10083 | 1 Piwigo | 1 Piwigo | 2025-04-12 | N/A |
Cross-site scripting (XSS) vulnerability in admin/plugin.php in Piwigo through 2.8.3 allows remote attackers to inject arbitrary web script or HTML via a crafted filename that is mishandled in a certain error case. | ||||
CVE-2016-10084 | 1 Piwigo | 1 Piwigo | 2025-04-12 | N/A |
admin/batch_manager.php in Piwigo through 2.8.3 allows remote authenticated administrators to conduct File Inclusion attacks via the $page['tab'] variable (aka the mode parameter). | ||||
CVE-2016-10105 | 1 Piwigo | 1 Piwigo | 2025-04-12 | N/A |
admin/plugin.php in Piwigo through 2.8.3 doesn't validate the sections variable while using it to include files. This can cause information disclosure and code execution if it contains a .. sequence. | ||||
CVE-2012-2209 | 1 Piwigo | 1 Piwigo | 2025-04-11 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in admin.php in Piwigo before 2.3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) section parameter in the configuration module, (2) installstatus parameter in the languages_new module, or (3) theme parameter in the theme module. | ||||
CVE-2011-3790 | 1 Piwigo | 1 Piwigo | 2025-04-11 | N/A |
Piwigo 2.1.5 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by tools/metadata.php and certain other files. | ||||
CVE-2012-2208 | 1 Piwigo | 1 Piwigo | 2025-04-11 | N/A |
Directory traversal vulnerability in upgrade.php in Piwigo before 2.3.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter. | ||||
CVE-2013-1469 | 1 Piwigo | 1 Piwigo | 2025-04-11 | N/A |
Directory traversal vulnerability in install.php in Piwigo before 2.4.7 allows remote attackers to read and delete arbitrary files via a .. (dot dot) in the dl parameter. | ||||
CVE-2013-1468 | 1 Piwigo | 1 Piwigo | 2025-04-11 | N/A |
Cross-site request forgery (CSRF) vulnerability in the LocalFiles Editor plugin in Piwigo before 2.4.7 allows remote attackers to hijack the authentication of administrators for requests that create arbitrary PHP files via unspecified vectors. | ||||
CVE-2010-1707 | 1 Piwigo | 1 Piwigo | 2025-04-11 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in register.php in Piwigo 2.0.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) login and (2) mail_address parameters. | ||||
CVE-2009-2933 | 1 Piwigo | 1 Piwigo | 2025-04-09 | N/A |
SQL injection vulnerability in comments.php in Piwigo before 2.0.3 allows remote attackers to execute arbitrary SQL commands via the items_number parameter. | ||||
CVE-2009-4039 | 1 Piwigo | 1 Piwigo | 2025-04-09 | N/A |
Cross-site scripting (XSS) vulnerability in Piwigo before 2.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2022-48007 | 1 Piwigo | 1 Piwigo | 2025-03-28 | 5.4 Medium |
A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent. | ||||
CVE-2023-26876 | 1 Piwigo | 1 Piwigo | 2025-02-13 | 8.8 High |
SQL injection vulnerability found in Piwigo v.13.5.0 and before allows a remote attacker to execute arbitrary code via the filter_user_id parameter to the admin.php?page=history&filter_image_id=&filter_user_id endpoint. | ||||
CVE-2023-33359 | 1 Piwigo | 1 Piwigo | 2025-01-31 | 4.3 Medium |
Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function. | ||||
CVE-2023-33361 | 1 Piwigo | 1 Piwigo | 2025-01-31 | 9.8 Critical |
Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php. | ||||
CVE-2023-27233 | 1 Piwigo | 1 Piwigo | 2025-01-22 | 8.8 High |
Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php. | ||||
CVE-2023-34626 | 1 Piwigo | 1 Piwigo | 2024-12-18 | 4.3 Medium |
Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function. | ||||
CVE-2023-44393 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 9.3 Critical |
Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue. |