CVE-2026-3013
High
|8.7Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a flaw in certain versions of Coppermine Photo Gallery to read any file on the server, potentially exposing sensitive information. This can be done without needing to log in, making it a serious risk for any site using the affected versions.
Technical Description
Coppermine Photo Gallery in versions 1.6.09 through 1.6.27 is vulnerable to path traversal. Unauthenticated remote attacker is able to exploit a vulnerable endpoint and construct payloads that allow to read content of any file accessible by the the web server process.This issue was fixed in version 1.6.28.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$4,579($1K-$5K)
Vendor Response
Grade APatched in 1 day
Quick Information
Published
Mar 11, 2026
27 days ago
Last Modified
Mar 12, 2026
26 days ago