Untriaged
Permalink
CVE-2026-27470
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Activity log
- Created suggestion
ZoneMinder: Second-Order SQL Injection in `getNearEvents()` via Stored Event Name and Cause Fields
ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
References
-
https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-r6gm-478g-f2c4 x_refsource_CONFIRM
-
https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.38 x_refsource_MISC
-
https://github.com/ZoneMinder/zoneminder/releases/tag/1.38.1 x_refsource_MISC
-
https://owasp.org/www-community/attacks/SQL_Injection x_refsource_MISC
Affected products
zoneminder
- ==>= 1.37.61, < 1.38.1
- ==< 1.36.38