Spip

Spip

56 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.24%
  • Published 26.11.2024 19:15:31
  • Last modified 03.07.2025 00:32:56

A cross-site scripting (XSS) vulnerability in the Article module of SPIP v4.3.3 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Title parameter.

Exploit
  • EPSS 0.62%
  • Published 26.11.2024 19:15:30
  • Last modified 07.07.2025 17:54:54

An authenticated arbitrary file upload vulnerability in the Documents module of SPIP v4.3.3 allows attackers to execute arbitrary code via uploading a crafted PDF file.

Exploit
  • EPSS 92.73%
  • Published 06.09.2024 16:15:03
  • Last modified 25.09.2025 19:15:42

SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.

  • EPSS 93.83%
  • Published 23.08.2024 18:15:07
  • Last modified 23.09.2025 16:15:30

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

  • EPSS 1.04%
  • Published 19.01.2024 05:15:09
  • Last modified 02.06.2025 15:15:32

SPIP before 4.1.14 and 4.2.x before 4.2.8 allows XSS via the name of an uploaded file. This is related to javascript/bigup.js and javascript/bigup.utils.js.

  • EPSS 0.17%
  • Published 04.01.2024 07:15:09
  • Last modified 03.06.2025 15:15:49

ecrire/public/assembler.php in SPIP before 4.1.13 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.

  • EPSS 93.38%
  • Published 28.02.2023 20:15:10
  • Last modified 11.03.2025 15:15:38

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.

Exploit
  • EPSS 0.74%
  • Published 27.02.2023 21:15:11
  • Last modified 21.11.2024 07:47:38

SPIP v4.1.5 and earlier was discovered to contain a SQL injection vulnerability via the _oups parameter. This vulnerability allows attackers to execute arbitrary code via a crafted POST request.

Exploit
  • EPSS 7.9%
  • Published 14.12.2022 00:15:09
  • Last modified 22.04.2025 16:15:33

RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter.

Exploit
  • EPSS 1.2%
  • Published 19.05.2022 21:15:08
  • Last modified 21.11.2024 06:58:14

Spip Web Framework v3.1.13 and below was discovered to contain multiple SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters.