Description
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
Exploits (12)
nomisec
WORKING POC
5 stars
by TheCyberguy-17 · remote
https://github.com/TheCyberguy-17/RCE_CVE-2024-7954
nomisec
WRITEUP
1 stars
by ShivanshKuntal · remote
https://github.com/ShivanshKuntal/Exploitation-of-a-Remote-Code-Execution-vulnerability--CVE-2024-7954-
metasploit
WORKING POC
EXCELLENT
by Valentin Lobstein, Laluka, Julien Voisin · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb
Nuclei Templates (1)
SPIP Porte Plume Plugin - Remote Code Execution
CRITICALby s4e-io
FOFA:
app="SPIP"
References (3)
Scores
CVSS v3
9.8
EPSS
0.9315
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Lab Environment
COMMUNITY
Community Lab
+7 more repos
Details
VulnCheck KEV
2024-09-22
CWE
CWE-1286
CWE-95
Status
published
Products (3)
SPIP/SPIP
4.1.0 - 4.1.16
SPIP/SPIP
4.2.0 - 4.2.13
SPIP/SPIP
4.3.0-alpha - 4.3.0-alpha2
Published
Aug 23, 2024
Tracked Since
Feb 18, 2026