Description
SPIP before 4.4.9 allows Blind Server-Side Request Forgery (SSRF) via syndicated sites in the private area. When editing a syndicated site, the application does not verify that the syndication URL is a valid remote URL, allowing an authenticated attacker to make the server issue requests to arbitrary internal or external destinations. This vulnerability is not mitigated by the SPIP security screen.
Published: 2026-02-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Blind Server‑Side Request Forgery (SSRF) that allows authenticated users to cause the server to request arbitrary internal or external URLs
Action: Apply Patch
AI Analysis

Impact

The vulnerability in SPIP versions prior to 4.4.9 permits an attacker who is logged in to edit a syndicated site and use an arbitrary URL. Without validation, the application forwards the request to the specified destination, giving the attacker the ability to exfiltrate data, probe internal services, or reach out to external hosts under the server's network context. The impact is an indirect data disclosure or network reconnaissance capability limited by the privileges of the authenticated user and the reachability of the target from the server.

Affected Systems

All installations of SPIP version 4.4.8 or older configured with syndication functionality are affected. The specific product name is SPIP, and the affected versions include any release prior to 4.4.9. No other SPIP versions or products are impacted, and no additional vendor or product information is listed in the CNA data.

Risk and Exploitability

A CVSS score of 5.3 indicates moderate severity, and an EPSS of less than 1% suggests that exploitation is predicted to be very unlikely at this time. The vulnerability is not included in the CISA KEV list. The attack requires an authenticated account with permission to edit syndicated sites, a capability typically reserved for site administrators or power users. Because the SSRF request originates from the server, the attacker can reach any resource accessible to that server, giving potential for internal network discovery or data exfiltration.

Generated by OpenCVE AI on April 16, 2026 at 16:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SPIP to version 4.4.9 or later where the SSRF issue is resolved
  • If an upgrade cannot be performed immediately, disable the syndication feature or restrict the list of allowed syndication URLs to a trusted whitelist
  • Ensure that only users with a proven need to manage syndication sites have administrative or content-editing rights

Generated by OpenCVE AI on April 16, 2026 at 16:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6155-1 spip security update
History

Tue, 24 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918

Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description SPIP before 4.4.9 allows Blind Server-Side Request Forgery (SSRF) via syndicated sites in the private area. When editing a syndicated site, the application does not verify that the syndication URL is a valid remote URL, allowing an authenticated attacker to make the server issue requests to arbitrary internal or external destinations. This vulnerability is not mitigated by the SPIP security screen.
Title SPIP < 4.4.9 Blind Server-Side Request Forgery via Syndicated Sites
First Time appeared Spip
Spip spip
CPEs cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
Vendors & Products Spip
Spip spip
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:31:16.854Z

Reserved: 2026-02-19T18:34:45.840Z

Link: CVE-2026-27472

cve-icon Vulnrichment

Updated: 2026-02-20T20:07:27.721Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T19:22:30.187

Modified: 2026-02-24T19:45:15.137

Link: CVE-2026-27472

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:00:09Z

Weaknesses