CVE-2023-27372

CRITICAL EXPLOITED NUCLEI

Spip < 3.2.18 - Insecure Deserialization

Title source: rule

Description

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.

Exploits (16)

nomisec WORKING POC 67 stars
by nuts7 · remote
https://github.com/nuts7/CVE-2023-27372
nomisec WORKING POC 6 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2023-27372
nomisec WORKING POC 6 stars
by 0SPwn · remote
https://github.com/0SPwn/CVE-2023-27372-PoC
nomisec WORKING POC 3 stars
by ThatNotEasy · remote
https://github.com/ThatNotEasy/CVE-2023-27372
nomisec WORKING POC 2 stars
by 1Ronkkeli · remote
https://github.com/1Ronkkeli/spip-cve-2023-27372-rce
nomisec SCANNER 2 stars
by izzz0 · client-side
https://github.com/izzz0/CVE-2023-27372-POC
nomisec STUB
by scriniariii · poc
https://github.com/scriniariii/CVE-2023-27372
nomisec WORKING POC
by redboltsec · remote
https://github.com/redboltsec/CVE-2023-27372-PoC
nomisec WORKING POC
by 1amthebest1 · remote
https://github.com/1amthebest1/CVE-2023-27372
nomisec WORKING POC
by dream434 · remote
https://github.com/dream434/CVE-2023-27372
nomisec WORKING POC
by G01d3nW01f · remote
https://github.com/G01d3nW01f/cve-2023-27372
nomisec SCANNER
by KirolosKhairy · poc
https://github.com/KirolosKhairy/CVE-2023-27372
nomisec WORKING POC
by estebanzarate · remote
https://github.com/estebanzarate/CVE-2023-27372-SPIP-4.2.1-Unauthenticated-RCE-PoC
exploitdb WORKING POC VERIFIED
by nuts7 · pythonwebappsphp
https://www.exploit-db.com/exploits/51536
vulncheck_xdb STUB
remote
https://github.com/thatformat/Hvv2023
metasploit WORKING POC EXCELLENT
by coiffeur, Laluka, Julien Voisin, Valentin Lobstein · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_rce_form.rb

Nuclei Templates (1)

SPIP - Remote Command Execution
CRITICALVERIFIEDby DhiyaneshDK,nuts7
Shodan: html:"spip.php?page=backend" || http.html:"spip.php?page=backend" || cpe:"cpe:2.3:a:spip:spip"
FOFA: body="spip.php?page=backend"

Scores

CVSS v3 9.8
EPSS 0.9312
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2023-05-03

Classification

CWE
CWE-502
Status published

Affected Products (5)

spip/spip < 3.2.18
spip/spip
spip/spip
spip/spip
debian/debian_linux

Timeline

Published Feb 28, 2023
Tracked Since Feb 18, 2026