CVE-2025-71243

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.
Configurations

Configuration 1 (hide)

cpe:2.3:a:spip:saisies:*:*:*:*:*:spip:*:*

History

26 Feb 2026, 15:07

Type Values Removed Values Added
First Time Spip saisies
Spip
References () https://blog.spip.net/Mise-a-jour-critique-de-securite-pour-le-plugin-Saisies.html - () https://blog.spip.net/Mise-a-jour-critique-de-securite-pour-le-plugin-Saisies.html - Vendor Advisory
References () https://plugins.spip.net/saisies - () https://plugins.spip.net/saisies - Product
References () https://www.vulncheck.com/advisories/spip-saisies-plugin-remote-code-execution - () https://www.vulncheck.com/advisories/spip-saisies-plugin-remote-code-execution - Third Party Advisory
CPE cpe:2.3:a:spip:saisies:*:*:*:*:*:spip:*:*

19 Feb 2026, 16:27

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-19 16:27

Updated : 2026-02-26 15:07


NVD link : CVE-2025-71243

Mitre link : CVE-2025-71243

CVE.ORG link : CVE-2025-71243


JSON object : View

Products Affected

spip

  • saisies
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')