An issue exists within Piwigo before v.14.2.0 allowing a malicious user to take over the application. This exploit involves chaining a Cross Site Request Forgery vulnerability to issue a Stored Cross Site Scripting payload stored within an Admin user's dashboard, executing remote JavaScript. This can be used to upload a new PHP file under an administrator and directly call that file from the victim's instance to connect back to a malicious listener.
References
| Link | Resource |
|---|---|
| https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f | Vendor Advisory |
| https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f | Vendor Advisory |
Configurations
History
13 May 2025, 14:59
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Piwigo
Piwigo piwigo |
|
| CPE | cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* | |
| References | () https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f - Vendor Advisory |
Information
Published : 2024-02-28 22:15
Updated : 2025-05-13 14:59
NVD link : CVE-2024-26450
Mitre link : CVE-2024-26450
CVE.ORG link : CVE-2024-26450
JSON object : View
Products Affected
piwigo
- piwigo
