CVE-2026-27470

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with permission to edit and view events in ZoneMinder to run any SQL commands they want against the database, potentially exposing or altering sensitive data. The attacker must be logged in as a user with those specific permissions to exploit this flaw.

Technical Description

ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 21, 2026

about 2 months ago

Last Modified

Feb 24, 2026

about 1 month ago

Vendor

zoneminder

Product

zoneminder