Description
ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
Published: 2026-02-21
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection with authenticated access
Action: Immediate Patch
AI Analysis

Impact

A second‑order SQL Injection vulnerability exists in ZoneMinder, a free open‑source closed‑circuit television platform. The flaw resides in the getNearEvents() routine within web/ajax/status.php. Although event Name and Cause values are inserted into the database using parameterized queries, the same stored data is later concatenated unescaped into SQL WHERE clauses during retrieval. This allows an attacker who can authenticate and possess Events edit and view rights to inject arbitrary SQL statements and thus read, modify, or delete data in the database. The attacker gains direct control over database queries but does not obtain code execution or local privileges beyond the database context.

Affected Systems

The issue affects ZoneMinder 1.36.37 and earlier, as well as 1.37.61 through 1.38.0. Administrators should verify that their deployments fall within these version ranges. The vulnerability is present in the web interface’s status.php file and can be exploited by any user with the appropriate permissions, regardless of network location.

Risk and Exploitability

With a CVSS v3 score of 8.8, the flaw is classified as high severity. The EPSS score is below 1 %, suggesting a low probability of attack at present, and the vulnerability is not listed in CISA’s Keystone Exploited Vulnerabilities catalog. Exploitation requires authentication and specific event‑editing privileges, limiting the attack surface to privileged users. Nonetheless, once active, the attacker could compromise the integrity and confidentiality of the ZoneMinder database and potentially disrupt surveillance functionality.

Generated by OpenCVE AI on April 17, 2026 at 16:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest released version (1.38.1 or newer) which contains the fix for the second‑order SQL injection.
  • For installations that cannot be updated immediately, remove or restrict Events edit and view permissions from user accounts that do not require them, limiting the ability to inject SQL.
  • Apply network‑level controls such as firewall rules or VPN restrictions to restrict access to the ZoneMinder web interface to trusted hosts only.

Generated by OpenCVE AI on April 17, 2026 at 16:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Zoneminder
Zoneminder zoneminder
Vendors & Products Zoneminder
Zoneminder zoneminder

Sat, 21 Feb 2026 08:15:00 +0000

Type Values Removed Values Added
Description ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
Title ZoneMinder: Second-Order SQL Injection in `getNearEvents()` via Stored Event Name and Cause Fields
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Zoneminder Zoneminder
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-24T18:29:37.068Z

Reserved: 2026-02-19T17:25:31.101Z

Link: CVE-2026-27470

cve-icon Vulnrichment

Updated: 2026-02-24T18:29:27.279Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T08:16:12.197

Modified: 2026-02-24T14:48:36.060

Link: CVE-2026-27470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:00:10Z

Weaknesses