-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-6155-1                   [email protected]
https://www.debian.org/security/                       Sebastien Delafond
March 03, 2026                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : spip
CVE ID         : CVE-2026-22205 CVE-2026-22206 CVE-2026-26223 CVE-2026-26345 
                 CVE-2026-27472 CVE-2026-27473 CVE-2026-27474 CVE-2026-27475

It was discovered that SPIP, a website engine for publishing, would
allow a malicious user to access protected information, and perform
various SQL injection, Cross-Side Scripting (XSS), and Server-Side
Request Forgery (SSRF) attacks. In some cases this could result in
arbitrary code execution.

For the stable distribution (trixie), these problems have been fixed
in version 4.4.11+dfsg-0+deb13u1.

We recommend that you upgrade your spip packages.

For the detailed security status of spip please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/spip

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmmmtFkACgkQEL6Jg/PV
nWRhCQf/fGSFDCwTZzoEitpbx4zjSHZhw7A6UlPChJnZ9M9V4DGvWe1AG8JqgpeZ
5LsGfdsSgxsRoFFXJtu++2p73+zEpd0LasAa1tuVGsrFt4uFtIfe3cBjHZSTa3Ml
mDtCYVc1gRdQcEr0B+vjIpn4smZg/Bc+LnBLY/mBJSPjyAJjFuwQnN/fF82/M9Xu
VyfWRv69R72tC0q52sVnMPbWECL4nFiOHjPMU3inFNlAR88jPPU0R0ziBhAcAeU9
Jn+u5YzUBm+H6v9+Or0aX4EaoXZsLJjZJfQ6Fde5YIIP1zdRts9SWlHUYU36veBX
nNqxfmnHg1EtuPeP7iXXMuNK63FqpQ==
=fBmU
-----END PGP SIGNATURE-----

Reply via email to