The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
id: CVE-2024-7954
info:
name: SPIP Porte Plume Plugin - Remote Code Execution
author: s4e-io
...