Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-48928
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-24 Feb, 2026 | 16:39
Updated At-24 Feb, 2026 | 16:39
Rejected At-
▼CVE Numbering Authority (CNA)
Piwigo's secret key can be brute forced

Piwigo is an open source photo gallery application for the web. In versions on the 14.x branch, when installing, the secret_key configuration parameter is set to MD5(RAND()) in MySQL. However, RAND() only has 30 bits of randomness, making it feasible to brute-force the secret key. The CSRF token is constructed partially from the secret key, and this can be used to check if the brute force succeeded. Trying all possible values takes approximately one hour. The impact of this is limited. The auto login key uses the user's password on top of the secret key. The pwg token uses the user's session identifier on top of the secret key. It seems that values for get_ephemeral_key can be generated when one knows the secret key. Version 15.0.0 contains a fix for the issue.

Affected Products
Vendor
PiwigoPiwigo
Product
Piwigo
Versions
Affected
  • >= 14.0.0, < 15.0.0
Problem Types
TypeCWE IDDescription
CWECWE-330CWE-330: Use of Insufficiently Random Values
Type: CWE
CWE ID: CWE-330
Description: CWE-330: Use of Insufficiently Random Values
Metrics
VersionBase scoreBase severityVector
4.02.7LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U
Version: 4.0
Base score: 2.7
Base severity: LOW
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/Piwigo/Piwigo/security/advisories/GHSA-hghg-37rg-7r42
x_refsource_CONFIRM
https://github.com/Piwigo/Piwigo/commit/552499e0533ce54b55f4304b41ca6cd7ccce51f8
x_refsource_MISC
Hyperlink: https://github.com/Piwigo/Piwigo/security/advisories/GHSA-hghg-37rg-7r42
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/Piwigo/Piwigo/commit/552499e0533ce54b55f4304b41ca6cd7ccce51f8
Resource:
x_refsource_MISC
Details not found