Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct this URL is taken from the HTTP request's Host header and is not validated at all. Therefore, an attacker can send a password-reset URL with a modified hostname to an existing user whose username or email the attacker knows or guesses. This issue has been patched in version 15.7.0.
History

Tue, 25 Nov 2025 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:piwigo:piwigo:15.6.0:*:*:*:*:*:*:*

Thu, 20 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Piwigo
Piwigo piwigo
Vendors & Products Piwigo
Piwigo piwigo

Wed, 19 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
Description Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct this URL is taken from the HTTP request's Host header and is not validated at all. Therefore, an attacker can send a password-reset URL with a modified hostname to an existing user whose username or email the attacker knows or guesses. This issue has been patched in version 15.7.0.
Title Piwigo is vulnerable to one-click account takeover by modifying the password-reset link
Weaknesses CWE-640
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-18T22:18:45.747Z

Updated: 2025-11-19T16:48:47.058Z

Reserved: 2025-10-13T16:26:12.178Z

Link: CVE-2025-62406

cve-icon Vulnrichment

Updated: 2025-11-19T16:13:47.201Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-18T23:15:54.827

Modified: 2025-11-25T18:39:37.960

Link: CVE-2025-62406

cve-icon Redhat

No data.