SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.
PUBLISHED5.2CWE-94
SPIP < 4.4.14 Remote Code Execution via nginx
Problem type
Affected products
SPIP
SPIP
< 4.4.14 - AFFECTED
References
blog.spip.net
https://blog.spip.net/
vulncheck.com
https://www.vulncheck.com/advisories/spip-prior-to-remote-code-execution-via-nginx
GitHub Security Advisories
GHSA-qjjx-7vj9-gr7c
SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space...
https://github.com/advisories/GHSA-qjjx-7vj9-gr7cSPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-8430Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-8430",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-05-12T19:41:27.162Z",
"dateReserved": "2026-05-12T18:07:25.701Z",
"datePublished": "2026-05-12T18:43:25.046Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-05-12T19:41:27.162Z"
},
"datePublic": "2026-05-12T19:00:00.000Z",
"title": "SPIP < 4.4.14 Remote Code Execution via nginx",
"descriptions": [
{
"lang": "en",
"value": "SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.</p>"
}
]
}
],
"affected": [
{
"vendor": "SPIP",
"product": "SPIP",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "semver",
"lessThan": "4.4.14"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94 Improper Control of Generation of Code ('Code Injection')",
"cweId": "CWE-94",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://blog.spip.net/",
"tags": [
"vendor-advisory"
]
},
{
"url": "https://www.vulncheck.com/advisories/spip-prior-to-remote-code-execution-via-nginx",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
}
},
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Only affects deployments using certain nginx configurations.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>Only affects deployments using certain nginx configurations.</p>"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Louka Jacques-Chevallier",
"type": "finder"
}
]
}
}
}