Vulnerability Description
The SPIP jeux plugin versions prior to 4.1.1 contain a reflected cross-site scripting (XSS) vulnerability in the pre_propre pipeline. The plugin incorporates untrusted request parameters into HTML output without proper output encoding, allowing attackers to inject arbitrary script content into pages that render a jeux block. When a victim is induced to visit a crafted URL, the injected content is reflected into the response and executed in the victim's browser context.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Spip | Jeux | < 4.1.1 |
Related Weaknesses (CWE)
References
- https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.htmlRelease Notes
- https://chocapikk.com/posts/2026/spip-plugins-vulnerabilities/Third Party Advisory
- https://git.spip.net/spip-contrib-extensions/jeux/-/commit/3d240cffb258491acd72fPatch
- https://plugins.spip.net/jeuxProduct
- https://www.vulncheck.com/advisories/spip-jeux-reflected-xss-via-index-parameterThird Party Advisory
FAQ
What is CVE-2026-27746?
CVE-2026-27746 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The SPIP jeux plugin versions prior to 4.1.1 contain a reflected cross-site scripting (XSS) vulnerability in the pre_propre pipeline. The plugin incorporates untrusted request parameters into HTML out...
How severe is CVE-2026-27746?
CVE-2026-27746 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27746?
Check the references section above for vendor advisories and patch information. Affected products include: Spip Jeux.