CVE-2024-48928

Source
https://cve.org/CVERecord?id=CVE-2024-48928
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-48928.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-48928
Aliases
  • GHSA-hghg-37rg-7r42
Published
2026-02-24T16:39:56.944Z
Modified
2026-02-25T08:54:33.157858Z
Severity
  • 2.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Piwigo's secret key can be brute forced
Details

Piwigo is an open source photo gallery application for the web. In versions on the 14.x branch, when installing, the secretkey configuration parameter is set to MD5(RAND()) in MySQL. However, RAND() only has 30 bits of randomness, making it feasible to brute-force the secret key. The CSRF token is constructed partially from the secret key, and this can be used to check if the brute force succeeded. Trying all possible values takes approximately one hour. The impact of this is limited. The auto login key uses the user's password on top of the secret key. The pwg token uses the user's session identifier on top of the secret key. It seems that values for getephemeral_key can be generated when one knows the secret key. Version 15.0.0 contains a fix for the issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/48xxx/CVE-2024-48928.json",
    "cwe_ids": [
        "CWE-330"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/piwigo/piwigo

Affected ranges

Type
GIT
Repo
https://github.com/piwigo/piwigo
Events
Database specific
{
    "versions": [
        {
            "introduced": "14.0.0"
        },
        {
            "fixed": "15.0.0"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-48928.json"