
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52322 is a cross-site scripting (XSS) vulnerability discovered in SPIP content management system. The vulnerability affects SPIP versions before 4.1.13 and 4.2.x before 4.2.7, specifically in the ecrire/public/assembler.php component. The issue was identified and disclosed in December 2023, with patches released on December 18, 2023 (SPIP Blog).
The vulnerability exists because input from the _request() function is not restricted to safe characters such as alphanumerics in the ecrire/public/assembler.php file. The severity of this vulnerability has been assessed with a CVSS v3.1 Base Score of 6.1 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).
The XSS vulnerability can potentially lead to privilege escalation or information disclosure in affected SPIP installations (Debian LTS).
The vulnerability has been patched in SPIP versions 4.1.13 and 4.2.7. Users are strongly advised to upgrade to these versions or later. For Debian 10 (buster) users, the fix has been backported to version 3.2.4-1+deb10u13 (Debian LTS).
The vulnerability was responsibly disclosed by security researcher Hatim Chabik, and the SPIP development team promptly addressed the issue with security updates. The community response has been focused on encouraging users to update to the patched versions (SPIP Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."