{"id":"CVE-2024-7954","details":"The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.","modified":"2026-04-10T05:19:45.277275Z","published":"2024-08-23T18:15:07Z","references":[{"type":"ADVISORY","url":"https://vulncheck.com/advisories/spip-porte-plume"},{"type":"ARTICLE","url":"https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-3-0-alpha2-SPIP-4-2-13-SPIP-4.html"},{"type":"WEB","url":"https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_1_the_feather/"}],"schema_version":"1.7.5"}