← Retour aux CVEs
CVE-2026-27470
HIGH8.8
Description
ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie2/21/2026
Derniere modification2/24/2026
Sourcenvd
Observations honeypot0
Produits affectes
zoneminder:zoneminder
Faiblesses (CWE)
CWE-89
References
https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.38(security-advisories@github.com)
https://github.com/ZoneMinder/zoneminder/releases/tag/1.38.1(security-advisories@github.com)
https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-r6gm-478g-f2c4(security-advisories@github.com)
https://owasp.org/www-community/attacks/SQL_Injection(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.