Advisories: SPiP interface_traduction_objets < 2.2.2 Authenticated SQL Injection - Severity: HIGH - Date: 2/24/2026 - CVE: 2026-27747 - CVE: CVE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - CVSS V4 Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N - References: - SPiP interface_traduction_objets Plugin Webpage - SPiP interface_traduction_objets Plugin Fix Commit - Credit: Valentin Lobstein (Chocapikk) - Description: The SPiP interface_traduction_objets plugin versions prior to 4.3.3 contain an authenticated SQL injection vulnerability in . When handling translation requests, the plugin reads the parameter from user-supplied input and concatenates it directly into a SQL WHERE clause in a call to without input validation or parameterization. An authenticated attacker with editor-level privileges can inject crafted SQL expressions into the parameter to manipulate the backend query. Successful exploitation can result in disclosure or modification of database contents and may lead to denial of service depending on the database configuration and privileges.