๐Ÿ” CVE Alert

CVE-2026-26345

MEDIUM 5.4

SPIP < 4.4.8 Cross-Site Scripting in Public Area

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

SPIP before 4.4.8 contains a stored cross-site scripting (XSS) vulnerability in the public area triggered in certain edge-case usage patterns. The echapper_html_suspect() function does not adequately sanitize user-controlled content, allowing authenticated users with content-editing privileges (e.g., author-level roles and above) to inject malicious scripts. The injected payload may be rendered across multiple pages within the framework and execute in the browser context of other users, including administrators. Successful exploitation can allow attackers to perform actions in the security context of the victim user, including unauthorized modification of application state. This vulnerability is not mitigated by the SPIP security screen.

Vendor spip
Product spip
Published Feb 19, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for spip spip

Be the first to know when new medium vulnerabilities affecting spip spip are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

SPIP / SPIP
4.4.0 < 4.4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
blog.spip.net: https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-8.html git.spip.net: https://git.spip.net/spip/spip vulncheck.com: https://www.vulncheck.com/advisories/spip-cross-site-scripting-in-public-area

Credits

Philippe Boussin