Piwigo

3 CVEs product

Monthly

CVE-2025-62512 MEDIUM POC This Month

Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. [CVSS 5.3 MEDIUM]

PHP Golang Piwigo
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2024-48928 HIGH PATCH This Week

Piwigo is an open source photo gallery application for the web. In versions on the 14.x branch, when installing, the secret_key configuration parameter is set to MD5(RAND()) in MySQL. [CVSS 7.5 HIGH]

Golang MySQL CSRF Piwigo
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-62406 HIGH POC PATCH This Week

Piwigo is a full featured open source photo gallery application for the web. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Piwigo
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-62512
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. [CVSS 5.3 MEDIUM]

PHP Golang Piwigo
NVD GitHub
CVE-2024-48928
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Piwigo is an open source photo gallery application for the web. In versions on the 14.x branch, when installing, the secret_key configuration parameter is set to MD5(RAND()) in MySQL. [CVSS 7.5 HIGH]

Golang MySQL CSRF +1
NVD GitHub
CVE-2025-62406
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Piwigo is a full featured open source photo gallery application for the web. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Piwigo
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy