Vulnerability Description
Piwigo 13.8.0 and below is vulnerable to SQL Injection in the parameters max_level and min_register. These parameters are used in ws_user_gerList function from file include\ws_functions\pwg.users.php and this same function is called by ws.php file at some point can be used for searching users in advanced way in /admin.php?page=user_list.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Piwigo | Piwigo | <= 13.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/Piwigo/Piwigo/issues/2197ExploitIssue TrackingPatch
- https://github.com/inesmarcal/CVE-2024-43018ExploitThird Party Advisory
- https://github.com/joaosilva21/CVE-2024-43018ExploitThird Party Advisory
FAQ
What is CVE-2024-43018?
CVE-2024-43018 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Piwigo 13.8.0 and below is vulnerable to SQL Injection in the parameters max_level and min_register. These parameters are used in ws_user_gerList function from file include\ws_functions\pwg.users.php ...
How severe is CVE-2024-43018?
CVE-2024-43018 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-43018?
Check the references section above for vendor advisories and patch information. Affected products include: Piwigo Piwigo.