An issue exists within Piwigo before v.14.2.0 allowing a malicious user to take over the application. This exploit involves chaining a Cross Site Request Forgery vulnerability to issue a Stored Cross Site Scripting payload stored within an Admin user's dashboard, executing remote JavaScript. This can be used to upload a new PHP file under an administrator and directly call that file from the victim's instance to connect back to a malicious listener.
References
Link | Resource |
---|---|
https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f | Vendor Advisory |
https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f | Vendor Advisory |
Configurations
History
13 May 2025, 14:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Piwigo
Piwigo piwigo |
|
CPE | cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* | |
References | () https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f - Vendor Advisory |
Information
Published : 2024-02-28 22:15
Updated : 2025-05-13 14:59
NVD link : CVE-2024-26450
Mitre link : CVE-2024-26450
CVE.ORG link : CVE-2024-26450
JSON object : View
Products Affected
piwigo
- piwigo