First published: Thu May 19 2022(Updated: )
Spip Web Framework v3.1.13 and below was discovered to contain multiple SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Spip Spip | <=3.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28961 is a vulnerability in Spip Web Framework v3.1.13 and below that allows for multiple SQL injection attacks.
CVE-2022-28961 has a severity rating of 8.8 (High).
Spip Web Framework versions up to and including 3.1.13 are affected by CVE-2022-28961.
To fix CVE-2022-28961, update Spip Web Framework to version 3.2.8 or 3.1.14 as soon as possible.
You can find more information about CVE-2022-28961 at the following references: [Reference 1](https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-SPIP-3-2-8-et-SPIP-3-1-13.html), [Reference 2](https://github.com/spip/SPIP/commit/0394b44774555ae8331b6e65e35065dfa0bb41e4), [Reference 3](https://github.com/spip/SPIP/commit/6c1650713fc948318852ace759aab8f1a84791cf).