CVE-2023-27372

CRITICAL EXPLOITED NUCLEI

Spip < 3.2.18 - Insecure Deserialization

Title source: rule

Description

SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.

Exploits (16)

exploitdb WORKING POC VERIFIED
by nuts7 · pythonwebappsphp
https://www.exploit-db.com/exploits/51536
nomisec WORKING POC 67 stars
by nuts7 · remote
https://github.com/nuts7/CVE-2023-27372
nomisec WORKING POC 6 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2023-27372
nomisec WORKING POC 6 stars
by 0SPwn · remote
https://github.com/0SPwn/CVE-2023-27372-PoC
nomisec WORKING POC 3 stars
by ThatNotEasy · remote
https://github.com/ThatNotEasy/CVE-2023-27372
nomisec WORKING POC 2 stars
by 1Ronkkeli · remote
https://github.com/1Ronkkeli/spip-cve-2023-27372-rce
nomisec SCANNER 2 stars
by izzz0 · client-side
https://github.com/izzz0/CVE-2023-27372-POC
nomisec STUB
by scriniariii · poc
https://github.com/scriniariii/CVE-2023-27372
nomisec WORKING POC
by estebanzarate · remote
https://github.com/estebanzarate/CVE-2023-27372-SPIP-4.2.1-Unauthenticated-RCE-PoC
nomisec SCANNER
by KirolosKhairy · poc
https://github.com/KirolosKhairy/CVE-2023-27372
nomisec WORKING POC
by G01d3nW01f · remote
https://github.com/G01d3nW01f/cve-2023-27372
nomisec WORKING POC
by dream434 · remote
https://github.com/dream434/CVE-2023-27372
nomisec WORKING POC
by 1amthebest1 · remote
https://github.com/1amthebest1/CVE-2023-27372
nomisec WORKING POC
by redboltsec · remote
https://github.com/redboltsec/CVE-2023-27372-PoC
vulncheck_xdb STUB
remote
https://github.com/thatformat/Hvv2023
metasploit WORKING POC EXCELLENT
by coiffeur, Laluka, Julien Voisin, Valentin Lobstein · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_rce_form.rb

Nuclei Templates (1)

SPIP - Remote Command Execution
CRITICALVERIFIEDby DhiyaneshDK,nuts7
Shodan: html:"spip.php?page=backend" || http.html:"spip.php?page=backend" || cpe:"cpe:2.3:a:spip:spip"
FOFA: body="spip.php?page=backend"

Scores

CVSS v3 9.8
EPSS 0.9312
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-05-03
CWE
CWE-502
Status published
Products (3)
debian/debian_linux 11.0
spip/spip 4.2.0 (3 CPE variants)
spip/spip < 3.2.18
Published Feb 28, 2023
Tracked Since Feb 18, 2026