CVE-2025-71243
Published: 19 February 2026
Summary
CVE-2025-71243 is a critical-severity Code Injection (CWE-94) vulnerability in Spip Saisies. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of identified flaws like this critical RCE vulnerability in the Saisies plugin via patching to version 5.11.1 or later.
Mandates vulnerability scanning to identify deployments of vulnerable SPIP Saisies plugin versions affected by CVE-2025-71243.
Enables monitoring of system activity to detect exploitation attempts or successful RCE via anomalous behavior on the affected server.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated RCE in a public-facing CMS plugin, directly enabling exploitation of a public-facing application for initial access and code execution.
NVD Description
The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1…
more
or later.
Deeper analysisAI
CVE-2025-71243, published on 2026-02-19, is a critical Remote Code Execution (RCE) vulnerability (CWE-94) in the 'Saisies pour formulaire' (Saisies) plugin for SPIP content management system. It affects versions 5.4.0 through 5.11.0 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.
An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction, achieving arbitrary code execution on the affected server.
Advisories recommend immediate update to Saisies version 5.11.1 or later. The SPIP blog details the critical security update, the plugin page provides version information, and VulnCheck publishes an advisory on the RCE issue.
Details
- CWE(s)