Piwigo is an open source photo gallery application for the web. In versions on the 14.x branch, when installing, the secret_key configuration parameter is set to MD5(RAND()) in MySQL. However, RAND() only has 30 bits of randomness, making it feasible to brute-force the secret key. The CSRF token is constructed partially from the secret key, and this can be used to check if the brute force succeeded. Trying all possible values takes approximately one hour. The impact of this is limited. The auto login key uses the user's password on top of the secret key. The pwg token uses the user's session identifier on top of the secret key. It seems that values for get_ephemeral_key can be generated when one knows the secret key. Version 15.0.0 contains a fix for the issue.
References
Configurations
History
25 Feb 2026, 16:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Piwigo/Piwigo/commit/552499e0533ce54b55f4304b41ca6cd7ccce51f8 - Patch | |
| References | () https://github.com/Piwigo/Piwigo/security/advisories/GHSA-hghg-37rg-7r42 - Vendor Advisory | |
| First Time |
Piwigo
Piwigo piwigo |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* |
24 Feb 2026, 17:29
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 17:29
Updated : 2026-02-25 16:53
NVD link : CVE-2024-48928
Mitre link : CVE-2024-48928
CVE.ORG link : CVE-2024-48928
JSON object : View
Products Affected
piwigo
- piwigo
CWE
CWE-330
Use of Insufficiently Random Values
