Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27747: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SPIP interface_traduction_objets

0
High
VulnerabilityCVE-2026-27747cvecve-2026-27747cwe-89
Published: Wed Feb 25 2026 (02/25/2026, 03:07:44 UTC)
Source: CVE Database V5
Vendor/Project: SPIP
Product: interface_traduction_objets

Description

The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requests, the plugin reads the id_parent parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to sql_getfetsel() without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the id_parent parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges.

AI-Powered Analysis

AILast updated: 02/25/2026, 04:25:48 UTC

Technical Analysis

The SPIP interface_traduction_objets plugin versions prior to 4.3.3 contain an authenticated SQL injection vulnerability identified as CVE-2026-27747 (CWE-89). This vulnerability arises in the interface_traduction_objets_pipelines.php file, where the plugin processes translation requests. Specifically, the id_parent parameter, supplied by users, is concatenated directly into a SQL WHERE clause within a call to sql_getfetsel() without any input sanitization or use of prepared statements. This improper neutralization of special elements in SQL commands allows an attacker with editor-level privileges to inject crafted SQL expressions. Successful exploitation can manipulate backend database queries, leading to unauthorized data disclosure, modification, or even denial of service depending on the database's configuration and privileges. The vulnerability requires authentication but no additional user interaction, and the attack surface is limited to users with editor rights. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, low attack complexity, no user interaction, and significant impact on confidentiality and integrity. No public exploits have been reported yet, but the vulnerability poses a serious risk to affected SPIP installations.

Potential Impact

This vulnerability can have severe consequences for organizations using the vulnerable SPIP plugin. An attacker with editor-level access can leverage the SQL injection to exfiltrate sensitive data from the database, including potentially user credentials, content, or configuration data. They may also modify or delete data, undermining data integrity and trustworthiness. In some configurations, the injection could be used to cause denial of service by disrupting database operations. Since SPIP is a content management system used primarily in French-speaking countries and some international organizations, compromised installations could lead to data breaches, defacement, or operational disruptions. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with multiple editors or weak internal access controls. The vulnerability could also be chained with other attacks to escalate privileges or pivot within the network.

Mitigation Recommendations

Organizations should immediately upgrade the interface_traduction_objets plugin to version 4.3.3 or later where this vulnerability is fixed. If upgrading is not immediately possible, apply strict input validation and sanitization on the id_parent parameter to ensure it contains only expected numeric or safe values before it is used in SQL queries. Employ parameterized queries or prepared statements to prevent SQL injection. Restrict editor-level privileges to trusted users and monitor their activities closely. Implement database access controls to limit the impact of potential injection attacks, such as using least privilege principles for database accounts. Enable logging and alerting on suspicious database queries or unusual editor actions. Conduct regular security audits of SPIP installations and keep all components up to date. Consider deploying web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting this plugin.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-23T21:38:48.842Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e7674b7ef31ef0bd379e3

Added to database: 2/25/2026, 4:11:32 AM

Last enriched: 2/25/2026, 4:25:48 AM

Last updated: 2/26/2026, 6:29:52 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats