No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later. | |
| Title | SPIP Saisies Plugin < 5.11.1 Remote Code Execution | |
| First Time appeared |
Spip
Spip saisies Pour Formulaire |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:spip:saisies_pour_formulaire:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Spip
Spip saisies Pour Formulaire |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-19T20:15:39.064Z
Reserved: 2026-02-19T03:00:22.782Z
Link: CVE-2025-71243
Updated: 2026-02-19T20:14:51.393Z
Status : Received
Published: 2026-02-19T16:27:12.303
Modified: 2026-02-19T16:27:12.303
Link: CVE-2025-71243
No data.
OpenCVE Enrichment
No data.