AI description
CVE-2023-27372 is a Remote Code Execution (RCE) vulnerability found in SPIP, an open-source content management system (CMS) used for website publishing. This flaw allows unauthenticated attackers to execute arbitrary code on vulnerable servers. The vulnerability stems from the improper handling of serialization within form values in the public-facing area of SPIP. By submitting maliciously crafted serialized objects through form fields, an attacker can exploit this weakness to inject and execute arbitrary code on the underlying server. This issue affects SPIP versions prior to 4.2.1, including versions before 3.2.18, 4.0.10, and 4.1.8.
- Description
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- nvd@nist.gov
- NVD-CWE-noinfo
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-502
- Hype score
- Not currently trending
CVE-2025-71243 - SPIP Saisies Plugin RCE Advisory dropped today, PoC ready 30 minutes later. Full AI-assisted reversal from patch diff to confirmed RCE. Same exploitation pattern as CVE-2023-27372 - unsanitized input into SPIP's template engine with interdire_scripts=false. Two
@Chocapikk_
19 Feb 2026
1621 Impressions
4 Retweets
21 Likes
3 Bookmarks
2 Replies
0 Quotes
CVE-2025-71243 - SPIP Saisies Plugin RCE Advisory dropped today, PoC ready 30 minutes later. Full AI-assisted reversal from patch diff to confirmed RCE. Same exploitation pattern as CVE-2023-27372 - unsanitized input into SPIP's template engine with interdire_scripts=false. Two
@Chocapikk_
19 Feb 2026
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-71243 - SPIP Saisies Plugin RCE Advisory dropped today, PoC ready 30 minutes later. Full AI-assisted reversal from patch diff to confirmed RCE. Same exploitation pattern as CVE-2023-27372 - unsanitized input into SPIP's template engine with interdire_scripts=false. Two
@Chocapikk_
19 Feb 2026
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Boot-To-Root / Publisher - TryHackMe اللاب جدا طويل عشان افصله للاسف بس بحاول اختصر ثغره الويب كانت في spip - cve-2023-27372 ومن بعدها تطلع اليوزر ومن بعد اليوزر لازم تدخل بالبارت
@mr0xlord
26 Oct 2025
2876 Impressions
4 Retweets
63 Likes
34 Bookmarks
1 Reply
0 Quotes
CVE-2023-27372 is a privilege escalation vulnerability in Ivanti Avalanche, an enterprise MDM (mobile device management) system. GitHub: https://t.co/RoXcvgGE4N #CVE #PHP #vulnerable https://t.co/SE9B0Nd7j0 https://t.co/5rIYnccwz5
@CyberPentestLab
14 Feb 2025
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FF6C248E-6246-469B-858D-DB628B535BDA",
"versionEndExcluding": "3.2.18"
},
{
"criteria": "cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A67A687F-6F6C-4150-92BB-90A308B89B4A",
"versionEndExcluding": "4.0.10",
"versionStartIncluding": "4.0.0"
},
{
"criteria": "cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4188B203-546F-4EE3-AD33-A31F3AF16B76",
"versionEndExcluding": "4.1.8",
"versionStartIncluding": "4.1.0"
},
{
"criteria": "cpe:2.3:a:spip:spip:4.2.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D55ECBAF-CDAB-4F7E-9BD1-BD9178732934"
},
{
"criteria": "cpe:2.3:a:spip:spip:4.2.0:alpha:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1CED71D6-E720-4007-BEE3-B81CC4F5EDD2"
},
{
"criteria": "cpe:2.3:a:spip:spip:4.2.0:alpha2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0746C763-3FD4-4095-9F1C-9BEAE6E6E29B"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
],
"operator": "OR"
}
]
}
]