Description
A vulnerability has been found in osuuu LightPicture up to 1.2.2. This issue affects some unknown processing of the file /public/install/lp.sql of the component API Upload Endpoint. Such manipulation of the argument key leads to hard-coded credentials. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-19
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Hard‑coded credentials enable unauthorized remote access
Action: Assess Impact
AI Analysis

Impact

The flaw originates from the LightPicture API Upload Endpoint where manipulation of an argument key causes the application to load hard‑coded credentials from the /public/install/lp.sql file. This enables an attacker to obtain valid authentication tokens or administrator credentials from a remote connection, creating a path to compromise the system. The weakness is categorized as CWE‑259 (Use of Hard‑coded Password) and CWE‑798 (Use of Hard‑coded Credentials).

Affected Systems

The vulnerability affects osuuu LightPicture versions up to and including 1.2.2. The impacted component is the upload functionality accessible externally via the API. No other vendor or product variants are listed as vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. EPSS data is unavailable, but the vulnerability has been publicly disclosed and can be exploited remotely without special privileges, implying a realistic chance of exploitation. The vulnerability is not present in the CISA KEV catalog, yet the lack of vendor response increases potential risk. Attackers can craft requests to the upload endpoint to trigger the execution of the hard‑coded credential logic, gaining unauthorized access to the application.

Generated by OpenCVE AI on April 19, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify if a newer, patched version of LightPicture is available and apply it immediately.
  • If no patch exists, limit or block external access to the upload API endpoint to prevent remote exploitation.
  • Modify the /public/install/lp.sql file to remove hard‑coded credentials and replace them with securely generated, unique passwords; enforce password rotation and proper authentication mechanisms.

Generated by OpenCVE AI on April 19, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 19 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in osuuu LightPicture up to 1.2.2. This issue affects some unknown processing of the file /public/install/lp.sql of the component API Upload Endpoint. Such manipulation of the argument key leads to hard-coded credentials. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title osuuu LightPicture API Upload Endpoint lp.sql hard-coded credentials
First Time appeared Osuuu
Osuuu lightpicture
Weaknesses CWE-259
CWE-798
CPEs cpe:2.3:a:osuuu:lightpicture:*:*:*:*:*:*:*:*
Vendors & Products Osuuu
Osuuu lightpicture
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Osuuu Lightpicture
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-19T13:30:17.265Z

Reserved: 2026-04-18T20:01:42.583Z

Link: CVE-2026-6574

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-19T14:16:11.593

Modified: 2026-04-19T14:16:11.593

Link: CVE-2026-6574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-19T15:00:08Z

Weaknesses