Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.1

SPIP interface_traduction_objets plugin SQL injection risk

CVE-2026-27747
Summary

An attacker with a user account can inject malicious SQL code to access or change database data, or make the system unusable. This risk is present in older versions of the SPIP interface_traduction_objets plugin. Update to version 2.2.2 or later to fix the problem.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
spip interface_traduction_objets <= 2.2.2
Original title
The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requ...
Original description
The SPIP interface_traduction_objets plugin versions prior to 2.2.2 contain an authenticated SQL injection vulnerability in interface_traduction_objets_pipelines.php. When handling translation requests, the plugin reads the id_parent parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to sql_getfetsel() without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the id_parent parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges.
nvd CVSS3.1 8.8
nvd CVSS4.0 7.1
Vulnerability type
CWE-89 SQL Injection
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026