CVE-2026-27834

HIGH

CVSS v3

7.2

HIGH

EPSS Score

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability exists in the pwg.users.getList Web Service API method. The filter parameter is directly concatenated into a SQL query without proper sanitization, allowing authenticated administrators to execute arbitrary SQL commands. This issue has been patched in version 16.3.0.

Technical Details

CVSS v3 Vector
3.1
Published
4/3/2026
Last Modified
4/9/2026

Frequently Asked Questions

What is CVE-2026-27834?

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability exists in the pwg.users.getList Web Service API method. The filter parameter is directly concatenated into a SQL query without proper sanitization, allowing authenticated administrators to execute arbitrary SQL commands. This issue has been patched in version 16.3.0.

Is CVE-2026-27834 actively exploited?

Active exploitation of CVE-2026-27834 has not been confirmed. The EPSS score is N/A%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2026-27834?

CVE-2026-27834 has a CVSS v3 base score of 7.2 (HIGH severity), with vector string 3.1.

Is CVE-2026-27834 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.