Vulnerability Description
SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://blog.spip.net/
- https://www.vulncheck.com/advisories/spip-prior-to-remote-code-execution-via-ngi
FAQ
What is CVE-2026-8430?
CVE-2026-8430 is a vulnerability with a CVSS score of 8.1 (HIGH). SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the con...
How severe is CVE-2026-8430?
CVE-2026-8430 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8430?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.