Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71243: Improper Control of Generation of Code ('Code Injection') in SPIP Saisies pour formulaire

0
Critical
VulnerabilityCVE-2025-71243cvecve-2025-71243
Published: Thu Feb 19 2026 (02/19/2026, 14:58:15 UTC)
Source: CVE Database V5
Vendor/Project: SPIP
Product: Saisies pour formulaire

Description

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.

AI-Powered Analysis

AILast updated: 02/19/2026, 15:23:53 UTC

Technical Analysis

The vulnerability identified as CVE-2025-71243 affects the 'Saisies pour formulaire' plugin used in SPIP content management systems, specifically versions 5.4.0 through 5.11.0. This plugin facilitates form input handling but contains an improper control of code generation, leading to a critical Remote Code Execution (RCE) flaw. The root cause is the plugin's failure to properly sanitize or restrict dynamically generated code, allowing an attacker to inject and execute arbitrary code on the server hosting the SPIP instance. The vulnerability requires no authentication or user interaction, and the attack vector is network-based, meaning an attacker can exploit it remotely over the internet. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates that the attack is network accessible, requires low attack complexity, no privileges, and no user interaction, with high impact on confidentiality, integrity, and availability. This makes the vulnerability extremely severe, as successful exploitation can lead to full system compromise, data theft, or service disruption. The vulnerability was published on February 19, 2026, and while no active exploits have been reported, the critical nature demands immediate attention. The recommended remediation is to update the plugin to version 5.11.1 or later, where the issue has been fixed. Organizations using SPIP with this plugin should also review their web application firewall (WAF) rules and monitor for suspicious activity related to form submissions.

Potential Impact

The impact of CVE-2025-71243 is significant for organizations worldwide using SPIP CMS with the vulnerable 'Saisies pour formulaire' plugin. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full server compromise. This can result in unauthorized data access, data modification or deletion, deployment of ransomware or malware, and disruption of web services. Given SPIP's use in government, educational, and media websites, the vulnerability poses risks to sensitive information and critical infrastructure. The ease of exploitation and high severity increase the likelihood of targeted attacks and automated scanning by threat actors. Organizations may face reputational damage, regulatory penalties, and operational downtime if exploited. The vulnerability also increases the attack surface for lateral movement within networks if the compromised server is connected to internal systems. Overall, the threat undermines confidentiality, integrity, and availability of affected systems, making it a critical security concern.

Mitigation Recommendations

To mitigate CVE-2025-71243, organizations should immediately update the 'Saisies pour formulaire' plugin to version 5.11.1 or later, where the vulnerability is patched. Beyond patching, it is recommended to implement strict input validation and sanitization on all form inputs to reduce injection risks. Deploying a web application firewall (WAF) with custom rules to detect and block suspicious payloads targeting form inputs can provide an additional layer of defense. Regularly audit and monitor server logs for unusual activity or signs of exploitation attempts. Restrict network access to the SPIP server to trusted IPs where possible and segment the server from critical internal networks to limit lateral movement. Employ runtime application self-protection (RASP) tools if available to detect and prevent code injection attacks in real-time. Conduct security awareness training for administrators on timely patch management and vulnerability response. Finally, maintain regular backups of website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-19T03:00:22.782Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69972933732724e9dc4156ae

Added to database: 2/19/2026, 3:16:03 PM

Last enriched: 2/19/2026, 3:23:53 PM

Last updated: 2/20/2026, 11:18:49 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats