CVE-2026-27634
Published: 03 April 2026
Summary
CVE-2026-27634 is a critical-severity SQL Injection (CWE-89) vulnerability in Piwigo Piwigo. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of untrusted date filter parameters before concatenation into SQL queries, directly preventing SQL injection exploitation.
Mandates identification, reporting, and correction of the SQL injection flaw in ws_std_image_sql_filter(), as patched in Piwigo 16.3.0.
Enables vulnerability scanning to identify the SQL injection vulnerability and initiate remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote SQL injection in public-facing Piwigo web app directly enables T1190 (Exploit Public-Facing Application) for initial access; arbitrary SQL execution against the backend database directly enables T1213.006 (Data from Information Repositories: Databases) to extract contents including password hashes.
NVD Description
Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the four date filter parameters (f_min_date_available, f_max_date_available, f_min_date_created, f_max_date_created) in ws_std_image_sql_filter() are concatenated directly into SQL without any escaping or type validation. This could result…
more
in an unauthenticated attacker reading the full database, including user password hashes. This issue has been patched in version 16.3.0.
Deeper analysisAI
CVE-2026-27634 is a SQL injection vulnerability (CWE-89) affecting Piwigo, an open-source web-based photo gallery application. In versions prior to 16.3.0, the ws_std_image_sql_filter() function directly concatenates four date filter parameters—f_min_date_available, f_max_date_available, f_min_date_created, and f_max_date_created—into SQL queries without escaping or type validation, enabling arbitrary SQL execution.
An unauthenticated remote attacker can exploit this vulnerability with low attack complexity and no user interaction, as indicated by its CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Exploitation allows the attacker to read the full database, including sensitive user password hashes.
The issue has been patched in Piwigo version 16.3.0. Security practitioners should upgrade to this version for mitigation, with details available in the GitHub security advisory (GHSA-mgqc-3445-qghq), the patching commit (0d5ed1f7778bbe263410446d8cf64594df75bd08), and the release notes at piwigo.org/release-16.3.0.
Details
- CWE(s)