<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-27834 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-27834/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 22:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-27834/feed.xml" rel="self" type="application/rss+xml"/><item><title>Piwigo SQL Injection Vulnerability (CVE-2026-27834)</title><link>https://feed.craftedsignal.io/briefs/2026-04-piwigo-sql-injection/</link><pubDate>Fri, 03 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-piwigo-sql-injection/</guid><description>A SQL Injection vulnerability (CVE-2026-27834) exists in Piwigo versions prior to 16.3.0, allowing authenticated administrators to execute arbitrary SQL commands via the pwg.users.getList Web Service API method.</description><content:encoded><![CDATA[<p>Piwigo, an open-source photo gallery application, is vulnerable to SQL injection in versions before 16.3.0. The vulnerability resides in the <code>pwg.users.getList</code> Web Service API method.  Specifically, the <code>filter</code> parameter is directly concatenated into a SQL query without sufficient sanitization. This allows an authenticated administrator to inject and execute arbitrary SQL commands on the Piwigo server.  Successful exploitation could lead to data exfiltration, modification, or complete compromise of the Piwigo instance.  Version 16.3.0 patches this vulnerability. The vulnerability was reported on April 3rd, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated administrator logs into the Piwigo web interface.</li>
<li>The administrator crafts a malicious HTTP POST request to the <code>api.php</code> endpoint, targeting the <code>pwg.users.getList</code> Web Service API method.</li>
<li>The malicious request includes the <code>filter</code> parameter containing a SQL injection payload. The payload is designed to exploit the lack of sanitization.</li>
<li>The Piwigo application receives the request and processes the <code>pwg.users.getList</code> API call.</li>
<li>The application concatenates the attacker-controlled <code>filter</code> parameter directly into a SQL query without proper escaping or sanitization.</li>
<li>The crafted SQL query is executed against the Piwigo database.</li>
<li>The injected SQL code performs unauthorized actions, such as extracting sensitive data, modifying database records, or executing system commands via SQL.</li>
<li>The attacker retrieves the results of the injected SQL query from the HTTP response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-27834) in Piwigo versions before 16.3.0 can lead to complete compromise of the Piwigo installation. An attacker could potentially access sensitive data such as user credentials, private photos, and system configuration information. The attacker could also modify or delete data, disrupt service, or potentially gain unauthorized access to the underlying server. Given the administrator privilege required for exploitation, the impact is considered significant within the vulnerable Piwigo instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Piwigo to version 16.3.0 or later to patch CVE-2026-27834 (see references).</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts against the <code>pwg.users.getList</code> API endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>api.php</code> containing unusual characters or SQL keywords in the <code>filter</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>piwigo</category><category>sql-injection</category><category>cve-2026-27834</category></item></channel></rss>