CVE-2023-27372
CRITICAL EXPLOITED NUCLEISpip < 3.2.18 - Insecure Deserialization
Title source: ruleDescription
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
Exploits (16)
nomisec
WORKING POC
2 stars
by 1Ronkkeli · remote
https://github.com/1Ronkkeli/spip-cve-2023-27372-rce
nomisec
WORKING POC
by estebanzarate · remote
https://github.com/estebanzarate/CVE-2023-27372-SPIP-4.2.1-Unauthenticated-RCE-PoC
exploitdb
WORKING POC
VERIFIED
by nuts7 · pythonwebappsphp
https://www.exploit-db.com/exploits/51536
metasploit
WORKING POC
EXCELLENT
by coiffeur, Laluka, Julien Voisin, Valentin Lobstein · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_rce_form.rb
Nuclei Templates (1)
SPIP - Remote Command Execution
CRITICALVERIFIEDby DhiyaneshDK,nuts7
Shodan:
html:"spip.php?page=backend" || http.html:"spip.php?page=backend" || cpe:"cpe:2.3:a:spip:spip"
FOFA:
body="spip.php?page=backend"
References (8)
Scores
CVSS v3
9.8
EPSS
0.9312
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2023-05-03
Classification
CWE
CWE-502
Status
published
Affected Products (5)
spip/spip
< 3.2.18
spip/spip
spip/spip
spip/spip
debian/debian_linux
Timeline
Published
Feb 28, 2023
Tracked Since
Feb 18, 2026