2026-05-12 18:43CVE-2026-8430VulnCheck
PUBLISHED5.2CWE-94

SPIP < 4.4.14 Remote Code Execution via nginx

SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.

Problem type

Affected products

SPIP

SPIP

< 4.4.14 - AFFECTED

References

GitHub Security Advisories

GHSA-qjjx-7vj9-gr7c

SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space...

https://github.com/advisories/GHSA-qjjx-7vj9-gr7c

SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-8430
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-8430",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-05-12T19:41:27.162Z",
    "dateReserved": "2026-05-12T18:07:25.701Z",
    "datePublished": "2026-05-12T18:43:25.046Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-05-12T19:41:27.162Z"
      },
      "datePublic": "2026-05-12T19:00:00.000Z",
      "title": "SPIP < 4.4.14 Remote Code Execution via nginx",
      "descriptions": [
        {
          "lang": "en",
          "value": "SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "SPIP",
          "product": "SPIP",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "4.4.14"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-94 Improper Control of Generation of Code ('Code Injection')",
              "cweId": "CWE-94",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://blog.spip.net/",
          "tags": [
            "vendor-advisory"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/spip-prior-to-remote-code-execution-via-nginx",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "attackVector": "NETWORK",
            "attackComplexity": "HIGH",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH"
          }
        },
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "Only affects deployments using certain nginx configurations.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>Only affects deployments using certain nginx configurations.</p>"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Louka Jacques-Chevallier",
          "type": "finder"
        }
      ]
    }
  }
}