Home

Description

The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requests, the plugin reads the id_parent parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to sql_getfetsel() without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the id_parent parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges.

PUBLISHED Reserved 2026-02-23 | Published 2026-02-25 | Updated 2026-02-26 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version before 2.2.2
affected

Credits

Valentin Lobstein (Chocapikk) finder

VulnCheck coordinator

References

chocapikk.com/posts/2026/spip-plugins-vulnerabilities/ technical-description exploit

blog.spip.net/...jour-de-securite-sortie-de-SPIP-4-4-10.html vendor-advisory

plugins.spip.net/interface_traduction_objets product

git.spip.net/...mit/db3417b7811774f04c3ff191ca1737fe660ef0be patch

www.vulncheck.com/...tion-objets-authenticated-sql-injection third-party-advisory

cve.org (CVE-2026-27747)

nvd.nist.gov (CVE-2026-27747)

Download JSON