Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. The endpoint at password.php?action=lost returns distinct messages for valid vs. invalid accounts, enabling user enumeration. As of time of publication, no known patches are available.
References
| Link | Resource |
|---|---|
| https://github.com/Piwigo/Piwigo/security/advisories/GHSA-h4wx-7m83-xfxc | Exploit Mitigation Vendor Advisory |
Configurations
History
25 Feb 2026, 16:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* | |
| First Time |
Piwigo
Piwigo piwigo |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| References | () https://github.com/Piwigo/Piwigo/security/advisories/GHSA-h4wx-7m83-xfxc - Exploit, Mitigation, Vendor Advisory |
24 Feb 2026, 18:29
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 18:29
Updated : 2026-02-25 16:53
NVD link : CVE-2025-62512
Mitre link : CVE-2025-62512
CVE.ORG link : CVE-2025-62512
JSON object : View
Products Affected
piwigo
- piwigo
CWE
CWE-204
Observable Response Discrepancy
