CVE-2009-4039

Piwigo < 2.0.6 - Cross-Site Scripting

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-4039. PoCs published by Andrew Paterson.

AI-analyzed exploit summary This exploit demonstrates multiple XSS vulnerabilities in Piwigo 2.0.5 by injecting arbitrary JavaScript via the 'keyword' and 'author' parameters in the comments.php page. The PoC uses simple script tags to trigger an alert, confirming the vulnerability.

Description

Cross-site scripting (XSS) vulnerability in Piwigo before 2.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Andrew Paterson · textwebappsphp
https://www.exploit-db.com/exploits/34367

This exploit demonstrates multiple XSS vulnerabilities in Piwigo 2.0.5 by injecting arbitrary JavaScript via the 'keyword' and 'author' parameters in the comments.php page. The PoC uses simple script tags to trigger an alert, confirming the vulnerability.

Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: Piwigo 2.0.5
No auth needed
Prerequisites: Access to the target Piwigo instance · User interaction to trigger the XSS
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/37336
Patch, Vendor Advisory x_refsource_confirm
http://piwigo.org/releases/2.0.6
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/3221

Scores

EPSS 0.0247
EPSS Percentile 85.5%

Details

CWE
CWE-79
Status published
Products (6)
piwigo/piwigo 2.0.0
piwigo/piwigo 2.0.1
piwigo/piwigo 2.0.2
piwigo/piwigo 2.0.3
piwigo/piwigo 2.0.4
piwigo/piwigo < 2.0.5
Published Nov 20, 2009
Tracked Since Feb 18, 2026