CVE-2026-8430 PUBLISHED

SPIP < 4.4.14 Remote Code Execution via nginx

Assigner: VulnCheck
Reserved: 12.05.2026 Published: 12.05.2026 Updated: 12.05.2026

SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.2

Product Status

Vendor SPIP
Product SPIP
Versions Default: unaffected
  • affected from 0 to 4.4.14 (excl.)

Affected Configurations

Only affects deployments using certain nginx configurations.

Credits

  • Louka Jacques-Chevallier finder

References

Problem Types

  • CWE-94 Improper Control of Generation of Code ('Code Injection') CWE