Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Piwigo 13.6.0 - SQL Injection

0
Medium
Exploitwebexploit
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Piwigo 13.6.0 - SQL Injection

AI-Powered Analysis

AILast updated: 12/02/2025, 17:54:13 UTC

Technical Analysis

Piwigo 13.6.0 suffers from a SQL Injection vulnerability identified as CVE-2023-33362. The flaw exists in the admin.php page, specifically in the handling of the 'user_id' parameter within the 'profile' admin page. An authenticated administrator can exploit this by sending a crafted HTTP GET request containing SQL code that alters the intended query logic, such as 'user_id=' OR 1=1 --', which effectively bypasses normal query constraints. This injection can lead to unauthorized data disclosure, modification, or potentially full database compromise depending on the backend database privileges. The vulnerability arises from insufficient input sanitization and lack of parameterized queries in the affected code path. The exploit was tested on Windows but is applicable to any environment running the vulnerable Piwigo version. Although no public exploit kits or widespread attacks are currently reported, the availability of proof-of-concept code lowers the barrier for attackers. The vulnerability requires admin-level authentication, limiting exposure to insiders or compromised admin accounts. However, given Piwigo’s use in managing photo galleries and digital assets, sensitive personal or organizational data could be at risk. The lack of official patches or updates at the time of reporting necessitates immediate mitigation efforts. Organizations should audit their Piwigo installations, restrict admin access, and monitor for suspicious activity. Applying web application firewall (WAF) rules to detect SQL injection patterns and reviewing source code for secure query handling are recommended. This vulnerability highlights the importance of secure coding practices and timely patch management in open-source web applications.

Potential Impact

For European organizations, this SQL Injection vulnerability poses a significant risk to confidentiality and integrity of data managed within Piwigo installations. Organizations using Piwigo to store or manage sensitive images, personal data, or intellectual property could face data breaches or unauthorized data manipulation. The requirement for admin authentication reduces the risk of external attackers but raises concerns about insider threats or compromised admin credentials. Exploitation could lead to data leakage, defacement, or further lateral movement within the network. Given the widespread use of open-source CMS and digital asset management tools in sectors such as media, education, and government across Europe, the impact could be substantial if exploited. Additionally, GDPR compliance implications arise if personal data is exposed. The vulnerability could disrupt business operations and damage organizational reputation. The medium severity rating reflects the balance between the need for authentication and the potential damage from exploitation.

Mitigation Recommendations

1. Immediately restrict admin access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor and audit admin activity logs for unusual or unauthorized access patterns. 3. Apply input validation and sanitization on all user-supplied parameters, especially 'user_id' in admin.php, using parameterized queries or prepared statements to prevent SQL injection. 4. Deploy a Web Application Firewall (WAF) with rules specifically targeting SQL injection patterns to detect and block malicious requests. 5. Regularly update Piwigo installations to the latest versions once patches addressing this vulnerability are released. 6. Conduct code reviews and security testing on custom plugins or modifications to ensure no similar injection flaws exist. 7. Isolate Piwigo servers within segmented network zones to limit lateral movement in case of compromise. 8. Educate administrators on phishing and credential security to reduce risk of account compromise. 9. Backup databases regularly and verify integrity to enable recovery in case of data tampering. 10. Engage in threat hunting for indicators of compromise related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52443
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Piwigo 13.6.0 - SQL Injection

# Exploit Title: Piwigo 13.6.0 - SQL Injection
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage:  https://github.com/Piwigo/Piwigo
# Software Link: https://github.com/Piwigo/Piwigo
# Version: 13.6.0 
# Tested on: Windows
# CVE : CVE-2023-33362


Proof Of Concept:
GET /admin.php?page=profile&user_id=' OR 1=1 --  HTTP/1.1
Host: piwigo

Steps to Reproduce
Login as an admin user.
Send the request.
Observe the result
Code Length: 432 characters

Threat ID: 692f27653286267b25e73ff6

Added to database: 12/2/2025, 5:52:37 PM

Last enriched: 12/2/2025, 5:54:13 PM

Last updated: 12/4/2025, 7:10:07 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats