| Summary | The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. |
|---|---|
| Publication Date | Aug. 24, 2024, 3:15 a.m. |
| Registration Date | Aug. 26, 2024, 4:56 p.m. |
| Last Update | Aug. 24, 2024, 3:46 a.m. |