CVE-2026-27747

The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requests, the plugin reads the id_parent parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to sql_getfetsel() without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the id_parent parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:spip:interface_traduction_objets:*:*:*:*:*:*:*:*

History

02 Mar 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 8.8

27 Feb 2026, 20:40

Type Values Removed Values Added
First Time Spip interface Traduction Objets
Spip
References () https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.html - () https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.html - Release Notes
References () https://chocapikk.com/posts/2026/spip-plugins-vulnerabilities/ - () https://chocapikk.com/posts/2026/spip-plugins-vulnerabilities/ - Third Party Advisory
References () https://git.spip.net/spip-contrib-extensions/interface_traduction_objets/-/commit/db3417b7811774f04c3ff191ca1737fe660ef0be - () https://git.spip.net/spip-contrib-extensions/interface_traduction_objets/-/commit/db3417b7811774f04c3ff191ca1737fe660ef0be - Patch
References () https://plugins.spip.net/interface_traduction_objets - () https://plugins.spip.net/interface_traduction_objets - Product
References () https://www.vulncheck.com/advisories/spip-interface-traduction-objets-authenticated-sql-injection - () https://www.vulncheck.com/advisories/spip-interface-traduction-objets-authenticated-sql-injection - Third Party Advisory
CPE cpe:2.3:a:spip:interface_traduction_objets:*:*:*:*:*:*:*:*

26 Feb 2026, 21:28

Type Values Removed Values Added
References
  • () https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.html -

25 Feb 2026, 16:23

Type Values Removed Values Added
References
  • () https://chocapikk.com/posts/2026/spip-plugins-vulnerabilities/ -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
Summary (en) The SPIP interface_traduction_objets plugin versions prior to 4.3.3 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requests, the plugin reads the id_parent parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to sql_getfetsel() without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the id_parent parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges. (en) The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requests, the plugin reads the id_parent parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to sql_getfetsel() without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the id_parent parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges.

25 Feb 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-25 04:16

Updated : 2026-03-02 15:16


NVD link : CVE-2026-27747

Mitre link : CVE-2026-27747

CVE.ORG link : CVE-2026-27747


JSON object : View

Products Affected

spip

  • interface_traduction_objets
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')