Description
SPIP before 4.4.9 allows Cross-Site Scripting (XSS) in the private area, complementing an incomplete fix from SPIP 4.4.8. The echappe_anti_xss() function was not systematically applied to input, form, button, and anchor (a) HTML tags, allowing an attacker to inject malicious scripts through these elements. This vulnerability is not mitigated by the SPIP security screen.
Published: 2026-02-19
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting in private area
Action: Apply Patch
AI Analysis

Impact

SPIP versions prior to 4.4.9 allow attackers to inject malicious JavaScript scripts through form, button, and anchor tags in the private area, because the echappe_anti_xss() sanitization function was omitted for these elements. This cross‑site scripting flaw can lead to arbitrary client‑side code execution, enabling credential theft, session hijacking, or defacement. The vulnerability corresponds to CWE‑79 and remains unmitigated by the SPIP security screen.

Affected Systems

All installations of the SPIP content management system running an earlier release than 4.4.9, specifically SPIP:SPIP prior to 4.4.9, are affected. No further sub‑product distinctions are specified; any website that uses a pre‑4.4.9 SPIP build exposes the private area to XSS.

Risk and Exploitability

The Common Vulnerability Scoring System assigns a score of 4.8, indicating low to moderate severity. The Exploit Prediction Scoring System rate is below 1 %, suggesting a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog. The likely attack vector is an authenticated user who can submit content in the private area; the attacker crafts malicious input that bypasses the missing escape routine. Because the flaw exists only in private area pages, the scope of impact is restricted to visitors of those pages, but if an end‑user shares compromised content, widespread exposure could occur. Without an available public exploit, the threat remains theoretical, yet the inability of the SPIP security screen to mitigate the flaw calls for cautious remediation.

Generated by OpenCVE AI on April 16, 2026 at 16:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SPIP installation to version 4.4.9 or later, which includes the missing sanitization for private‑area tags.
  • If an upgrade is not immediately possible, audit custom private‑area forms and plugins to enforce proper escaping—apply the echappe_anti_xss() routine to all user‑supplied HTML tags.
  • Consider disabling or restricting private‑area functionality until a patch is applied, or remove any suspicious scripts from content already stored in the database.

Generated by OpenCVE AI on April 16, 2026 at 16:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6155-1 spip security update
History

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Tue, 24 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Fri, 20 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description SPIP before 4.4.9 allows Cross-Site Scripting (XSS) in the private area, complementing an incomplete fix from SPIP 4.4.8. The echappe_anti_xss() function was not systematically applied to input, form, button, and anchor (a) HTML tags, allowing an attacker to inject malicious scripts through these elements. This vulnerability is not mitigated by the SPIP security screen.
Title SPIP < 4.4.9 Cross-Site Scripting in Private Area (Incomplete Fix)
First Time appeared Spip
Spip spip
CPEs cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*
Vendors & Products Spip
Spip spip
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:31:18.391Z

Reserved: 2026-02-19T18:34:45.841Z

Link: CVE-2026-27474

cve-icon Vulnrichment

Updated: 2026-02-20T20:09:17.448Z

cve-icon NVD

Status : Modified

Published: 2026-02-19T19:22:30.540

Modified: 2026-03-02T15:16:36.767

Link: CVE-2026-27474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:00:09Z

Weaknesses