CVE-2023-27372
CRITICAL EXPLOITED NUCLEISpip < 3.2.18 - Insecure Deserialization
Title source: ruleDescription
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
Exploits (16)
exploitdb
WORKING POC
VERIFIED
by nuts7 · pythonwebappsphp
https://www.exploit-db.com/exploits/51536
nomisec
WORKING POC
2 stars
by 1Ronkkeli · remote
https://github.com/1Ronkkeli/spip-cve-2023-27372-rce
nomisec
WORKING POC
by estebanzarate · remote
https://github.com/estebanzarate/CVE-2023-27372-SPIP-4.2.1-Unauthenticated-RCE-PoC
metasploit
WORKING POC
EXCELLENT
by coiffeur, Laluka, Julien Voisin, Valentin Lobstein · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_rce_form.rb
Nuclei Templates (1)
SPIP - Remote Command Execution
CRITICALVERIFIEDby DhiyaneshDK,nuts7
Shodan:
html:"spip.php?page=backend" || http.html:"spip.php?page=backend" || cpe:"cpe:2.3:a:spip:spip"
FOFA:
body="spip.php?page=backend"
References (8)
Scores
CVSS v3
9.8
EPSS
0.9312
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-05-03
CWE
CWE-502
Status
published
Products (3)
debian/debian_linux
11.0
spip/spip
4.2.0 (3 CPE variants)
spip/spip
< 3.2.18
Published
Feb 28, 2023
Tracked Since
Feb 18, 2026