Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27745: CWE-94 Improper Control of Generation of Code ('Code Injection') in SPIP interface_traduction_objets

0
High
VulnerabilityCVE-2026-27745cvecve-2026-27745cwe-94
Published: Wed Feb 25 2026 (02/25/2026, 03:08:11 UTC)
Source: CVE Database V5
Vendor/Project: SPIP
Product: interface_traduction_objets

Description

The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated remote code execution vulnerability in the translation interface workflow. The plugin incorporates untrusted request data into a hidden form field that is rendered without SPIP output filtering. Because fields prefixed with an underscore bypass protection mechanisms and the hidden content is rendered with filtering disabled, an authenticated attacker with editor-level privileges can inject crafted content that is evaluated through SPIP's template processing chain, resulting in execution of code in the context of the web server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:04:31 UTC

Technical Analysis

The vulnerability CVE-2026-27745 affects the SPIP content management system's interface_traduction_objets plugin prior to version 2.2.2. It is categorized under CWE-94, indicating improper control of code generation leading to code injection. The root cause lies in the plugin's translation interface workflow, where untrusted user input is embedded into hidden form fields prefixed with an underscore. These fields bypass SPIP's standard output filtering mechanisms, allowing malicious content to be rendered and subsequently evaluated by SPIP's template processing engine. An attacker with authenticated editor-level access can exploit this by injecting crafted payloads that execute arbitrary code on the web server hosting SPIP. The vulnerability requires no additional user interaction and does not demand higher privilege levels beyond editor rights, making it relatively easy to exploit once access is gained. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no authentication beyond editor privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability poses a significant risk to affected systems due to the potential for remote code execution and full compromise of the web server environment.

Potential Impact

The impact of CVE-2026-27745 is substantial for organizations using the vulnerable SPIP plugin. Successful exploitation allows attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in unauthorized data access, data modification or deletion, service disruption, and use of the compromised server as a pivot point for further attacks within the network. Since the vulnerability requires only editor-level privileges, insider threats or compromised editor accounts significantly increase risk. The breach of confidentiality, integrity, and availability can damage organizational reputation, lead to regulatory penalties, and cause operational downtime. Given SPIP's use in various content management scenarios, including government, education, and media sectors, the threat extends to sensitive and critical information systems worldwide.

Mitigation Recommendations

To mitigate CVE-2026-27745, organizations should immediately upgrade the interface_traduction_objets plugin to version 2.2.2 or later where the vulnerability is patched. In addition, implement strict input validation and sanitization on all user-supplied data, especially data incorporated into hidden form fields. Review and harden SPIP's template processing configurations to ensure output filtering cannot be bypassed by special field prefixes. Limit editor-level privileges to trusted users and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of account compromise. Regularly audit user activities and monitor logs for suspicious behavior indicative of exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block injection patterns targeting SPIP templates. Finally, maintain an incident response plan tailored to web server compromises to quickly contain and remediate any exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-23T21:38:48.842Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e7673b7ef31ef0bd379cf

Added to database: 2/25/2026, 4:11:31 AM

Last enriched: 3/11/2026, 8:04:31 PM

Last updated: 4/12/2026, 5:36:47 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses