DEBIAN-CVE-2026-27473

Source
https://security-tracker.debian.org/tracker/CVE-2026-27473
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-27473.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-27473
Upstream
Downstream
Published
2026-02-19T19:22:30.363Z
Modified
2026-03-03T12:01:24.232552Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

SPIP before 4.4.9 allows Stored Cross-Site Scripting (XSS) via syndicated sites in the private area. The #URL_SYNDIC output is not properly sanitized on the private syndicated site page, allowing an attacker who can set a malicious syndication URL to inject persistent scripts that execute when other administrators view the syndicated site details.

References

Affected packages

Debian:11 / spip

Package

Name
spip
Purl
pkg:deb/debian/spip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.2.11-3
3.2.11-3+deb11u1
3.2.11-3+deb11u2
3.2.11-3+deb11u3
3.2.11-3+deb11u4
3.2.11-3+deb11u5
3.2.11-3+deb11u6
3.2.11-3+deb11u7
3.2.11-3+deb11u8
3.2.11-3+deb11u9
3.2.11-3+deb11u10
3.2.12-1
4.*
4.0.1-1
4.0.2-1
4.0.4-1
4.0.5-1
4.1.0~alpha+dfsg-1
4.1.0~beta+dfsg-1
4.1.0~rc+dfsg-1
4.1.1+dfsg-1
4.1.2+dfsg-1
4.1.5+dfsg-1
4.1.7+dfsg-1
4.1.8+dfsg-1
4.1.9+dfsg-1
4.1.10+dfsg-1
4.1.11+dfsg-1
4.1.12+dfsg-1
4.1.13+dfsg-1
4.1.15+dfsg-1
4.1.15+dfsg-2
4.2.2+dfsg-1
4.2.3+dfsg-1
4.2.4+dfsg-1
4.2.5+dfsg-1
4.2.6+dfsg-1
4.2.7+dfsg-1
4.2.8+dfsg-1
4.2.9+dfsg-1
4.2.9+dfsg-2
4.2.10+dfsg-1
4.2.11+dfsg-1
4.2.12+dfsg-1
4.2.13+dfsg-1
4.2.14+dfsg-1
4.3.0~alpha+dfsg-1
4.3.0~alpha.2+dfsg-1
4.3.0~beta+dfsg-1
4.3.0+dfsg-1
4.3.1+dfsg-1
4.3.2+dfsg-1
4.3.3+dfsg-1
4.3.4+dfsg-1
4.3.5+dfsg-1
4.3.6+dfsg-1
4.3.8+dfsg-1
4.4.2+dfsg-1
4.4.3+dfsg-1
4.4.4+dfsg-1
4.4.5+dfsg-1
4.4.6+dfsg-1
4.4.7+dfsg-1
4.4.8+dfsg-1
4.4.9+dfsg-1
4.4.10+dfsg-1
4.4.11+dfsg-1
4.4.13+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-27473.json"

Debian:13 / spip

Package

Name
spip
Purl
pkg:deb/debian/spip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.11+dfsg-0+deb13u1

Affected versions

4.*
4.4.3+dfsg-1
4.4.3+dfsg-1+deb13u1
4.4.4+dfsg-1
4.4.5+dfsg-1
4.4.6+dfsg-1
4.4.7+dfsg-1
4.4.8+dfsg-1
4.4.9+dfsg-1
4.4.10+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-27473.json"

Debian:14 / spip

Package

Name
spip
Purl
pkg:deb/debian/spip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.9+dfsg-1

Affected versions

4.*
4.4.3+dfsg-1
4.4.4+dfsg-1
4.4.5+dfsg-1
4.4.6+dfsg-1
4.4.7+dfsg-1
4.4.8+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-27473.json"