CVE-2026-27470
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with permission to edit and view events in ZoneMinder to run any SQL commands they want against the database, potentially exposing or altering sensitive data. The attacker must be logged in as a user with those specific permissions to exploit this flaw.
Technical Description
ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 21, 2026
about 2 months ago
Last Modified
Feb 24, 2026
about 1 month ago
Vendor
zoneminder
Product
zoneminder