SPIP 3.1.x suffer from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/infoplugin.php involving the $plugin parameter, as demonstrated by a /ecrire/?exec=infoplugin URL.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9998.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-alpha"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-beta"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.1.3"
}
]
}
]