CVE-2026-26345
Cross-Site Scripting in SPIP Public Area Before
Publication date: 2026-02-19
Last updated on: 2026-02-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| spip | spip | From 4.4.0 (inc) to 4.4.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in SPIP versions before 4.4.8 and allows Cross-Site Scripting (XSS) attacks in the public area under certain edge-case usage patterns.
The issue arises because the function echapper_html_suspect() does not properly detect all forms of malicious content, enabling an attacker to inject scripts that execute in a visitor's browser.
Additionally, this vulnerability is not mitigated by the SPIP security screen.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can inject malicious scripts that run in the browsers of visitors to the affected SPIP site.
This can lead to unauthorized actions such as stealing session cookies, redirecting users to malicious sites, or performing actions on behalf of the user without their consent.
The impact is limited by the relatively low CVSS scores, indicating that exploitation requires user interaction and has limited scope and impact.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know