CVE-2024-26450

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26450
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26450.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26450
Related
  • GHSA-p362-cfpj-q55f
Published
2024-02-28T22:15:26.730Z
Modified
2025-11-15T15:42:14.619382Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue exists within Piwigo before v.14.2.0 allowing a malicious user to take over the application. This exploit involves chaining a Cross Site Request Forgery vulnerability to issue a Stored Cross Site Scripting payload stored within an Admin user's dashboard, executing remote JavaScript. This can be used to upload a new PHP file under an administrator and directly call that file from the victim's instance to connect back to a malicious listener.

References

Affected packages

Git / github.com/piwigo/piwigo

Affected ranges

Type
GIT
Repo
https://github.com/piwigo/piwigo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

12.*

12.0.0RC1
12.0.0RC2
12.0.0beta1
12.0.0beta2

13.*

13.0.0RC1
13.0.0RC2
13.0.0RC3
13.0.0RC4
13.0.0beta1
13.0.0beta2

14.*

14.0.0
14.0.0RC1
14.0.0RC2
14.0.0beta1
14.0.0beta2
14.0.0beta3
14.1.0

2.*

2.10.0RC1
2.10.0beta1
2.10.0beta2
2.11.0beta1
2.11.0beta2
2.11.0beta3
2.11.0beta4
2.8.0
2.8.0RC1
2.8.0RC2
2.8.1
2.8.2
2.9.0RC1
2.9.0RC2
2.9.0beta1
2.9.0beta2