Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27745: CWE-94 Improper Control of Generation of Code ('Code Injection') in SPIP interface_traduction_objets

0
High
VulnerabilityCVE-2026-27745cvecve-2026-27745cwe-94
Published: Wed Feb 25 2026 (02/25/2026, 03:08:11 UTC)
Source: CVE Database V5
Vendor/Project: SPIP
Product: interface_traduction_objets

Description

The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated remote code execution vulnerability in the translation interface workflow. The plugin incorporates untrusted request data into a hidden form field that is rendered without SPIP output filtering. Because fields prefixed with an underscore bypass protection mechanisms and the hidden content is rendered with filtering disabled, an authenticated attacker with editor-level privileges can inject crafted content that is evaluated through SPIP's template processing chain, resulting in execution of code in the context of the web server.

AI-Powered Analysis

AILast updated: 02/25/2026, 04:26:03 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27745 affects the SPIP content management system's interface_traduction_objets plugin versions prior to 4.3.3. It is classified under CWE-94, indicating improper control of code generation or code injection. The core issue stems from the plugin's handling of untrusted input data within the translation interface workflow. Specifically, the plugin incorporates untrusted request data into a hidden form field that is rendered without SPIP's standard output filtering. Additionally, fields prefixed with an underscore bypass SPIP's protection mechanisms, allowing this hidden content to be rendered with filtering disabled. An attacker who is authenticated with editor-level privileges can craft malicious input that is injected into this hidden field. This injected content is then processed and evaluated by SPIP's template engine, resulting in remote code execution within the context of the web server. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 4.0 base score is 8.7, reflecting high severity due to the ease of exploitation (network attack vector, low attack complexity, no user interaction), the requirement for privileges (editor-level), and the high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to SPIP users until patched. No official patch links were provided at the time of this report, but upgrading to version 4.3.3 or later is implied as the remediation path.

Potential Impact

If exploited, this vulnerability allows an attacker with editor-level access to execute arbitrary code on the web server hosting the SPIP CMS. This can lead to full compromise of the affected system, including unauthorized data access, data modification, service disruption, and potential lateral movement within the network. The confidentiality of sensitive content managed by SPIP can be breached, integrity of website content and configurations can be altered, and availability can be impacted through denial-of-service or destructive payloads. Organizations relying on SPIP for content management, especially those with multiple editors or contributors, face elevated risk since any compromised editor account can be leveraged for exploitation. The vulnerability's remote exploitation capability increases the attack surface, potentially allowing attackers to bypass perimeter defenses once editor credentials are obtained. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as public disclosure may prompt attackers to develop exploits rapidly.

Mitigation Recommendations

Organizations should immediately upgrade the interface_traduction_objets plugin to version 4.3.3 or later, where this vulnerability is addressed. If upgrading is not immediately feasible, restrict editor-level privileges to trusted users only and implement strict access controls and monitoring on accounts with such privileges. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the translation interface workflow, especially those attempting to inject code via hidden form fields. Review and harden SPIP template processing configurations to enforce output filtering and disable or restrict processing of fields prefixed with underscores. Conduct regular audits of editor activity logs to detect anomalous behavior indicative of exploitation attempts. Additionally, consider network segmentation to limit exposure of the SPIP server and employ multi-factor authentication to reduce the risk of credential compromise. Finally, monitor vulnerability advisories and threat intelligence feeds for updates or emerging exploit reports related to this CVE.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-23T21:38:48.842Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e7673b7ef31ef0bd379cf

Added to database: 2/25/2026, 4:11:31 AM

Last enriched: 2/25/2026, 4:26:03 AM

Last updated: 2/26/2026, 6:29:52 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats