CVE-2025-62512

Source
https://cve.org/CVERecord?id=CVE-2025-62512
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62512.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62512
Aliases
  • GHSA-h4wx-7m83-xfxc
Published
2026-02-24T16:43:28.919Z
Modified
2026-02-28T06:40:45.519408Z
Severity
  • 5.5 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Piwigo Vulnerable to User Enumeration via Password Reset Endpoint
Details

Piwigo is an open source photo gallery application for the web. In version 15.5.0 and likely earlier 15.x releases, the password reset functionality in Piwigo allows an unauthenticated attacker to determine whether a given username or email address exists in the system. The endpoint at password.php?action=lost returns distinct messages for valid vs. invalid accounts, enabling user enumeration. As of time of publication, no known patches are available.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62512.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-204"
    ]
}
References

Affected packages

Git / github.com/piwigo/piwigo

Affected ranges

Type
GIT
Repo
https://github.com/piwigo/piwigo
Events

Affected versions

15.*
15.0.0
15.1.0
15.2.0
15.3.0
15.4.0
15.5.0
15.6.0
15.7.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62512.json"