← Back to CVEs
CVE-2026-27743
CRITICAL9.8
Description
The SPIP referer_spam plugin versions prior to 1.3.0 contain an unauthenticated SQL injection vulnerability in the referer_spam_ajouter and referer_spam_supprimer action handlers. The handlers read the url parameter from a GET request and interpolate it directly into SQL LIKE clauses without input validation or parameterization. The endpoints do not enforce authorization checks and do not use SPIP action protections such as securiser_action(), allowing remote attackers to execute arbitrary SQL queries.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/25/2026
Last Modified3/3/2026
Sourcenvd
Honeypot Sightings0
Affected Products
spip:referer_spam
Weaknesses (CWE)
CWE-89
References
https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.html(disclosure@vulncheck.com)
https://chocapikk.com/posts/2026/spip-plugins-vulnerabilities/(disclosure@vulncheck.com)
https://git.spip.net/spip-contrib-extensions/referer_spam/-/commit/33682df73cd5f7e9c72d8c4d5088611fa2441683(disclosure@vulncheck.com)
https://plugins.spip.net/referer_spam.html(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/spip-referer-spam-unauthenticated-sql-injection(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.