The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
References
Configurations
No configuration.
History
23 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-1286 CWE-95 |
23 Aug 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-23 18:15
Updated : 2025-09-23 16:15
NVD link : CVE-2024-7954
Mitre link : CVE-2024-7954
CVE.ORG link : CVE-2024-7954
JSON object : View
Products Affected
No product.