CVE-2026-27885
Published: 03 April 2026
Summary
CVE-2026-27885 is a high-severity SQL Injection (CWE-89) vulnerability in Piwigo Piwigo. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely remediation of identified flaws, directly addressing this SQL injection vulnerability through application of the patch released in Piwigo version 16.3.0.
SI-10 mandates validation of information inputs at system entry points such as the Activity List API endpoint, preventing SQL injection by rejecting malformed or malicious inputs.
AC-6 limits administrative privileges to the minimum necessary, reducing the attack surface by minimizing the number of accounts able to authenticate and exploit the high-privilege SQL injection vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app API directly enables remote exploitation of the application (T1190) and extraction of data/credentials from the backend database (T1213.006).
NVD Description
Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability was discovered in Piwigo affecting the Activity List API endpoint. This vulnerability allows an authenticated administrator to extract sensitive data from…
more
the database, including user credentials, email addresses, and all stored content. This issue has been patched in version 16.3.0.
Deeper analysisAI
CVE-2026-27885 is a SQL injection vulnerability in the Activity List API endpoint of Piwigo, an open-source photo gallery application for the web. It affects all versions prior to 16.3.0. The flaw, classified under CWE-89, carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts with network accessibility and low attack complexity, but requiring high privileges.
An authenticated administrator can exploit this vulnerability remotely to extract sensitive data from the database, including user credentials, email addresses, and all stored content. No user interaction is needed, and the attack does not alter the scope, allowing full compromise of the database contents accessible to the admin role.
Piwigo has addressed the issue in version 16.3.0, as detailed in the project's security advisory (GHSA-wfmr-9hg8-jh3m), the patching commit (c172d284e11eab4a5dbadd2844d26f734d5c8c72), and the release announcement. Security practitioners should upgrade to 16.3.0 or later and review access controls for admin accounts.
Details
- CWE(s)