{"id":"CVE-2023-27372","details":"SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.","modified":"2026-03-13T07:32:14.996304Z","published":"2023-02-28T20:15:10.243Z","references":[{"type":"WEB","url":"https://packetstorm.news/files/id/171921"},{"type":"WEB","url":"https://packetstorm.news/files/id/173044"},{"type":"WEB","url":"http://packetstormsecurity.com/files/171921/SPIP-Remote-Command-Execution.html"},{"type":"WEB","url":"http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5367"},{"type":"ADVISORY","url":"https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-2-1-SPIP-4-1-8-SPIP-4-0-10-et.html"},{"type":"FIX","url":"https://git.spip.net/spip/spip/commit/5aedf49b89415a4df3eb775eee3801a2b4b88266"},{"type":"FIX","url":"https://git.spip.net/spip/spip/commit/96fbeb38711c6706e62457f2b732a652a04a409d"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.18"}]},{"events":[{"introduced":"4.0.0"},{"fixed":"4.0.10"}]},{"events":[{"introduced":"4.1.0"},{"fixed":"4.1.8"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.0-alpha"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2.0-alpha2"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-27372.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}