CVE-2024-7954
CRITICAL EXPLOITED NUCLEISPIP - RCE
Title source: llmDescription
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
Exploits (12)
nomisec
WORKING POC
5 stars
by TheCyberguy-17 · remote
https://github.com/TheCyberguy-17/RCE_CVE-2024-7954
nomisec
WRITEUP
1 stars
by ShivanshKuntal · remote
https://github.com/ShivanshKuntal/Exploitation-of-a-Remote-Code-Execution-vulnerability--CVE-2024-7954-
metasploit
WORKING POC
EXCELLENT
by Valentin Lobstein, Laluka, Julien Voisin · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
Nuclei Templates (1)
SPIP Porte Plume Plugin - Remote Code Execution
CRITICALby s4e-io
FOFA:
app="SPIP"
References (3)
Scores
CVSS v3
9.8
EPSS
0.9375
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2024-09-22
Classification
CWE
CWE-1286
CWE-95
Status
draft
Timeline
Published
Aug 23, 2024
Tracked Since
Feb 18, 2026