Cyber Posture

CVE-2026-27470

HighPublic PoC

Published: 21 February 2026

Published
21 February 2026
Modified
24 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 1.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27470 is a high-severity SQL Injection (CWE-89) vulnerability in Zoneminder Zoneminder. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 1.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification, reporting, and timely correction of flaws such as the second-order SQL injection in ZoneMinder via available patches in versions 1.36.38 and 1.38.1.

prevent

Mandates validation of information inputs like Event Name and Cause fields before concatenation into SQL WHERE clauses, directly preventing SQL injection exploitation.

preventdetect

Involves scanning for vulnerabilities like this SQL injection and responding promptly, enabling proactive mitigation before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Second-order SQL injection in public-facing web app (status.php) allows authenticated user with limited Events permissions to run arbitrary queries, enabling exploitation of internet-facing applications and privilege escalation to full DB control with high CIA impact.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and…

more

Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.

Deeper analysisAI

CVE-2026-27470 is a second-order SQL injection vulnerability affecting ZoneMinder, a free open-source closed-circuit television software application. The issue resides in the web/ajax/status.php file, specifically within the getNearEvents() function, impacting versions 1.36.37 and below, as well as 1.37.61 through 1.38.0. Event field values such as Name and Cause are initially stored safely using parameterized queries but are later retrieved and directly concatenated into SQL WHERE clauses without proper escaping, enabling injection.

An authenticated user with Events edit and view permissions can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows execution of arbitrary SQL queries, potentially leading to high-impact confidentiality, integrity, and availability violations, as reflected in the CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Mitigation is available through patched releases: ZoneMinder 1.36.38 and 1.38.1 address the vulnerability, as detailed in the project's GitHub security advisory (GHSA-r6gm-478g-f2c4). Security practitioners should upgrade affected installations immediately and review access controls for Events permissions.

Details

CWE(s)

Affected Products

zoneminder
zoneminder
≤ 1.36.38 · 1.37.61 — 1.38.1

CVEs Like This One

CVE-2025-65791Same product: Zoneminder Zoneminder
CVE-2025-26200Shared CWE-89
CVE-2026-30711Shared CWE-89
CVE-2026-33539Shared CWE-89
CVE-2026-24908Shared CWE-89
CVE-2026-2751Shared CWE-89
CVE-2025-24669Shared CWE-89
CVE-2026-22206Shared CWE-89
CVE-2025-24728Shared CWE-89
CVE-2025-29893Shared CWE-89

References