Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-26223
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-19 Feb, 2026 | 15:26
Updated At-19 Feb, 2026 | 15:26
Rejected At-
▼CVE Numbering Authority (CNA)
SPIP < 4.4.8 Cross-Site Scripting via Iframe Tags in Private Area

SPIP before 4.4.8 allows Cross-Site Scripting (XSS) in the private area via malicious iframe tags. The application does not properly sandbox or escape iframe content in the back-office, allowing an attacker to inject and execute malicious scripts. The fix adds a sandbox attribute to iframe tags in the private area. This vulnerability is not mitigated by the SPIP security screen.

Affected Products
Vendor
SPIP
Product
SPIP
Default Status
unaffected
Versions
Affected
  • From 4.4.0 before 4.4.8 (semver)
Problem Types
TypeCWE IDDescription
CWEImproperImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: Improper
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
4.04.8MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Version: 4.0
Base score: 4.8
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Arthur Deloffre (Vozec)
finder
Louka Jacques-Chevallier (Laluka)
finder
Philippe Boussin
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-8.html
vendor-advisory
patch
https://git.spip.net/spip/spip
product
https://www.vulncheck.com/advisories/spip-cross-site-scripting-via-iframe-tags-in-private-area
third-party-advisory
Hyperlink: https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-8.html
Resource:
vendor-advisory
patch
Hyperlink: https://git.spip.net/spip/spip
Resource:
product
Hyperlink: https://www.vulncheck.com/advisories/spip-cross-site-scripting-via-iframe-tags-in-private-area
Resource:
third-party-advisory
Details not found