CVE-2026-27470
Publication date 21 February 2026
Last updated 27 February 2026
Ubuntu priority
Cvss 3 Severity Score
Description
ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| zoneminder | 25.10 questing |
Needs evaluation
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2026-27470
- https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-r6gm-478g-f2c4
- https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.38
- https://github.com/ZoneMinder/zoneminder/releases/tag/1.38.1
- https://owasp.org/www-community/attacks/SQL_Injection