Authenticated Remote Code Execution in SPIP Interface_traduction_objets Plugin
CVE-2026-27745
8.7HIGH
What is CVE-2026-27745?
The Interface_traduction_objets plugin for SPIP contains a vulnerability that allows authenticated attackers to execute arbitrary code via the translation interface. Specifically, the plugin fails to appropriately filter untrusted data rendered in a hidden form field, which can be manipulated by users with editor-level privileges. This design flaw permits crafted content to be evaluated within SPIP's template processing system, enabling remote code execution in the context of the web server. To mitigate this issue, users are advised to update to version 4.3.3 or later.
Affected Version(s)
interface_traduction_objets 0 < 2.2.2
References
CVSS V4
Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Valentin Lobstein (Chocapikk)
VulnCheck
