Cyber Posture

CVE-2026-27745

HighPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated remote code execution vulnerability in the translation interface workflow. The plugin incorporates untrusted request data into a hidden form field that is rendered without SPIP output filtering. Because fields…

more

prefixed with an underscore bypass protection mechanisms and the hidden content is rendered with filtering disabled, an authenticated attacker with editor-level privileges can inject crafted content that is evaluated through SPIP's template processing chain, resulting in execution of code in the context of the web server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of untrusted request data to prevent injection of crafted content into hidden form fields.

prevent

Mandates output filtering to block rendering of malicious payloads through SPIP's template processing chain.

prevent

Ensures timely remediation of the flaw by updating the interface_traduction_objets plugin to version 2.2.2 or later.

Security SummaryAI

CVE-2026-27745 is an authenticated remote code execution vulnerability (CWE-94) in the SPIP interface_traduction_objets plugin for versions prior to 2.2.2. The issue resides in the translation interface workflow, where the plugin incorporates untrusted request data into a hidden form field that is rendered without SPIP output filtering. Fields prefixed with an underscore bypass SPIP's protection mechanisms, and the hidden content is processed with filtering disabled, enabling injected content to be evaluated through SPIP's template processing chain and resulting in code execution within the web server context. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An authenticated attacker possessing editor-level privileges can exploit this vulnerability over the network with low complexity and no user interaction required. By submitting crafted content via untrusted request data, the attacker tricks the plugin into rendering malicious payloads in the hidden form field, leading to arbitrary code execution on the server. This grants high-impact confidentiality, integrity, and availability effects, potentially allowing full server compromise, data exfiltration, or further lateral movement within the environment.

Advisories and patch notes emphasize updating the interface_traduction_objets plugin to version 2.2.2 or later to mitigate the vulnerability. Key resources include the SPIP security update blog post announcing related fixes, a detailed analysis of SPIP plugin vulnerabilities, the specific patching commit in the plugin's Git repository, the official plugin page, and VulnCheck's advisory on the authenticated RCE.

Details

CWE(s)

Affected Products

spip
interface traduction objets
≤ 2.2.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1221 Template Injection Stealth
Adversaries may create or modify references in user document templates to conceal malicious code or force authentication attempts.
Why these techniques?

CVE-2026-27745 is an authenticated RCE via template injection in a public-facing SPIP web plugin, directly mapping to Exploit Public-Facing Application (T1190) and Template Injection (T1221).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References