CVE-2026-27475Deserialization of Untrusted Data in Spip

Severity
9.2CRITICALNVD
EPSS
0.1%
top 65.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 19

Description

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior access or another vulnerability) can trigger arbitrary object instantiation and potentially achieve code execution. The use of serialized data in these components has been deprecated and will be removed in SPIP 5. This vulnerability is not mitigated by the S

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

NVDspip/spip4.4.04.4.9
debiandebian/spip< spip 4.4.9+dfsg-1 (forky)
Debianspip/spip< 4.4.11+dfsg-0+deb13u1+1

🔴Vulnerability Details

2
GHSA
GHSA-hxjp-v4qc-fcjg: SPIP before 42026-02-19
OSV
CVE-2026-27475: SPIP before 42026-02-19

📋Vendor Advisories

1
Debian
CVE-2026-27475: spip - SPIP before 4.4.9 allows Insecure Deserialization in the public area through the...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-27475 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-27475 — Deserialization of Untrusted Data | cvebase