Cyber Posture

CVE-2026-27885

HighPublic PoC

Published: 03 April 2026

Published
03 April 2026
Modified
09 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 13.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27885 is a high-severity SQL Injection (CWE-89) vulnerability in Piwigo Piwigo. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely remediation of identified flaws, directly addressing this SQL injection vulnerability through application of the patch released in Piwigo version 16.3.0.

prevent

SI-10 mandates validation of information inputs at system entry points such as the Activity List API endpoint, preventing SQL injection by rejecting malformed or malicious inputs.

prevent

AC-6 limits administrative privileges to the minimum necessary, reducing the attack surface by minimizing the number of accounts able to authenticate and exploit the high-privilege SQL injection vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web app API directly enables remote exploitation of the application (T1190) and extraction of data/credentials from the backend database (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability was discovered in Piwigo affecting the Activity List API endpoint. This vulnerability allows an authenticated administrator to extract sensitive data from…

more

the database, including user credentials, email addresses, and all stored content. This issue has been patched in version 16.3.0.

Deeper analysisAI

CVE-2026-27885 is a SQL injection vulnerability in the Activity List API endpoint of Piwigo, an open-source photo gallery application for the web. It affects all versions prior to 16.3.0. The flaw, classified under CWE-89, carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts with network accessibility and low attack complexity, but requiring high privileges.

An authenticated administrator can exploit this vulnerability remotely to extract sensitive data from the database, including user credentials, email addresses, and all stored content. No user interaction is needed, and the attack does not alter the scope, allowing full compromise of the database contents accessible to the admin role.

Piwigo has addressed the issue in version 16.3.0, as detailed in the project's security advisory (GHSA-wfmr-9hg8-jh3m), the patching commit (c172d284e11eab4a5dbadd2844d26f734d5c8c72), and the release announcement. Security practitioners should upgrade to 16.3.0 or later and review access controls for admin accounts.

Details

CWE(s)

Affected Products

piwigo
piwigo
≤ 16.3.0

CVEs Like This One

CVE-2026-27634Same product: Piwigo Piwigo
CVE-2026-27834Same product: Piwigo Piwigo
CVE-2026-27833Same product: Piwigo Piwigo
CVE-2024-48928Same product: Piwigo Piwigo
CVE-2026-23492Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2025-25116Shared CWE-89
CVE-2025-52025Shared CWE-89
CVE-2025-56316Shared CWE-89
CVE-2026-0702Shared CWE-89

References