CVE-2024-7954

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
Configurations

No configuration.

History

23 Sep 2025, 16:15

Type Values Removed Values Added
Summary
  • (es) El complemento porte_plume utilizado por SPIP antes de 4.30-alpha2, 4.2.13 y 4.1.16 es vulnerable a una vulnerabilidad de ejecución de código arbitrario. Un atacante remoto y no autenticado puede ejecutar PHP arbitrario como usuario de SPIP enviando una solicitud HTTP manipulada.
CWE CWE-284 CWE-1286
CWE-95

23 Aug 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-23 18:15

Updated : 2025-09-23 16:15


NVD link : CVE-2024-7954

Mitre link : CVE-2024-7954

CVE.ORG link : CVE-2024-7954


JSON object : View

Products Affected

No product.

CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-1286

Improper Validation of Syntactic Correctness of Input