CVE-2026-26223

Source
https://cve.org/CVERecord?id=CVE-2026-26223
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26223.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26223
Downstream
Published
2026-02-19T16:27:15.817Z
Modified
2026-02-26T01:23:58.366997Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

SPIP before 4.4.8 allows cross-site scripting (XSS) in the private area via malicious iframe tags. The application does not properly sandbox or escape iframe content in the back-office, allowing an attacker to inject and execute malicious scripts. The fix adds a sandbox attribute to iframe tags in the private area. This vulnerability is not mitigated by the SPIP security screen.

References

Affected packages

Git / git.spip.net/spip/spip

Affected ranges

Type
GIT
Repo
https://git.spip.net/spip/spip
Events
Introduced
34c023d47b424b5b4daebe8be37e2c4f1142ebc0
Fixed
70220f88459c9e4ccefa49e64b56d21963278578

Affected versions

4.*
4.4.0
4.4.1
4.4.2
4.4.3
4.4.4
4.4.5
4.4.6
4.4.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26223.json"