SPIP interface_traduction_objets < 2.2.2 Authenticated SQL Injection
Description
The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requests, the plugin reads the id_parent parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to sql_getfetsel() without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the id_parent parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges.
Affected products
2- SPIP/interface_traduction_objetsv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.spip.net/spip-contrib-extensions/interface_traduction_objets/-/commit/db3417b7811774f04c3ff191ca1737fe660ef0bemitrepatch
- chocapikk.com/posts/2026/spip-plugins-vulnerabilities/mitretechnical-descriptionexploit
- blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.htmlmitrevendor-advisory
- www.vulncheck.com/advisories/spip-interface-traduction-objets-authenticated-sql-injectionmitrethird-party-advisory
- plugins.spip.net/interface_traduction_objetsmitreproduct
News mentions
0No linked articles in our index yet.