Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct this URL is taken from the HTTP request's Host header and is not validated at all. Therefore, an attacker can send a password-reset URL with a modified hostname to an existing user whose username or email the attacker knows or guesses. This issue has been patched in version 15.7.0.
References
| Link | Resource |
|---|---|
| https://github.com/Piwigo/Piwigo/commit/9d2565465efc3570963ff431b45cad21610f6692 | Patch |
| https://github.com/Piwigo/Piwigo/security/advisories/GHSA-9986-w7jf-33f6 | Exploit Vendor Advisory |
| https://github.com/Piwigo/Piwigo/security/advisories/GHSA-9986-w7jf-33f6 | Exploit Vendor Advisory |
Configurations
History
25 Nov 2025, 18:39
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:piwigo:piwigo:15.6.0:*:*:*:*:*:*:* | |
| References | () https://github.com/Piwigo/Piwigo/commit/9d2565465efc3570963ff431b45cad21610f6692 - Patch | |
| References | () https://github.com/Piwigo/Piwigo/security/advisories/GHSA-9986-w7jf-33f6 - Exploit, Vendor Advisory | |
| First Time |
Piwigo
Piwigo piwigo |
19 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Piwigo/Piwigo/security/advisories/GHSA-9986-w7jf-33f6 - |
18 Nov 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 23:15
Updated : 2025-11-25 18:39
NVD link : CVE-2025-62406
Mitre link : CVE-2025-62406
CVE.ORG link : CVE-2025-62406
JSON object : View
Products Affected
piwigo
- piwigo
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password
