Unrated severityNVD Advisory· Published Nov 18, 2025· Updated Nov 19, 2025
Piwigo is vulnerable to one-click account takeover by modifying the password-reset link
CVE-2025-62406
Description
Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct this URL is taken from the HTTP request's Host header and is not validated at all. Therefore, an attacker can send a password-reset URL with a modified hostname to an existing user whose username or email the attacker knows or guesses. This issue has been patched in version 15.7.0.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/Piwigo/Piwigo/commit/9d2565465efc3570963ff431b45cad21610f6692mitrex_refsource_MISC
- github.com/Piwigo/Piwigo/security/advisories/GHSA-9986-w7jf-33f6mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.