osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)
CVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture <= 1.2.2, leading to hardcoded credentials exposure.
osuuu LightPicture, up to version 1.2.2, is vulnerable to a hardcoded credentials exposure vulnerability (CVE-2026-6574). This flaw resides within the API Upload Endpoint and is triggered when processing the /public/install/lp.sql file. An attacker can manipulate the key argument to exploit this vulnerability. The vendor has been notified about the vulnerability but has not responded. Public exploits are available, increasing the risk of exploitation. This vulnerability allows an attacker to potentially gain unauthorized access and control over the application.
Attack Chain
- Attacker identifies an instance of osuuu LightPicture running version 1.2.2 or earlier.
- The attacker crafts a malicious HTTP request targeting the API Upload Endpoint.
- The request includes a modified
keyargument within the/public/install/lp.sqlfile path. - The application processes the crafted request without proper sanitization.
- Due to the manipulated
keyargument, the application exposes hardcoded credentials. - The attacker retrieves the exposed hardcoded credentials from the server’s response.
- The attacker leverages the acquired credentials to authenticate and gain unauthorized access to the application.
- With unauthorized access, the attacker can perform malicious activities such as data theft, modification, or deletion.
Impact
Successful exploitation of CVE-2026-6574 can lead to complete compromise of the osuuu LightPicture application and potentially the underlying server. The vulnerability exposes hardcoded credentials, enabling attackers to bypass authentication and gain administrative privileges. The impact includes unauthorized access to sensitive data, modification of application settings, and potential disruption of service. The vulnerability affects all installations of osuuu LightPicture up to version 1.2.2.
Recommendation
- Deploy the Sigma rule
Detect Suspicious LP.SQL Accessto identify attempts to access the vulnerable file (log source: webserver). - Apply input validation and sanitization to the
keyargument within the API Upload Endpoint to prevent manipulation (reference CVE-2026-6574). - Monitor web server logs for suspicious requests targeting the
/public/install/lp.sqlfile with unusual parameters (log source: webserver). - If upgrading is not possible, implement a web application firewall (WAF) rule to block requests containing malicious patterns in the
keyargument (log source: firewall).
Detection coverage 2
Detect Suspicious LP.SQL Access
highDetects attempts to access the lp.sql file, potentially indicating exploitation attempts of CVE-2026-6574.
Detect Suspicious Key Argument Manipulation in LP.SQL
criticalDetects suspicious manipulation of the 'key' argument when accessing the lp.sql file, indicating potential exploitation of CVE-2026-6574.
Detection queries are kept inside the platform. Get full rules →