Cyber Posture

CVE-2025-71243

CriticalPublic PoCRCE

Published: 19 February 2026

Published
19 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.8541 99.4th percentile
Risk Priority 71 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-71243 is a critical-severity Code Injection (CWE-94) vulnerability in Spip Saisies. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of identified flaws like this critical RCE vulnerability in the Saisies plugin via patching to version 5.11.1 or later.

detect

Mandates vulnerability scanning to identify deployments of vulnerable SPIP Saisies plugin versions affected by CVE-2025-71243.

detect

Enables monitoring of system activity to detect exploitation attempts or successful RCE via anomalous behavior on the affected server.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated RCE in a public-facing CMS plugin, directly enabling exploitation of a public-facing application for initial access and code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1…

more

or later.

Deeper analysisAI

CVE-2025-71243, published on 2026-02-19, is a critical Remote Code Execution (RCE) vulnerability (CWE-94) in the 'Saisies pour formulaire' (Saisies) plugin for SPIP content management system. It affects versions 5.4.0 through 5.11.0 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.

An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction, achieving arbitrary code execution on the affected server.

Advisories recommend immediate update to Saisies version 5.11.1 or later. The SPIP blog details the critical security update, the plugin page provides version information, and VulnCheck publishes an advisory on the RCE issue.

Details

CWE(s)

Affected Products

spip
saisies
5.4.0 — 5.11.1

CVEs Like This One

CVE-2026-27744Same vendor: Spip
CVE-2026-27745Same vendor: Spip
CVE-2026-22205Same vendor: Spip
CVE-2026-27475Same vendor: Spip
CVE-2026-35178Shared CWE-94
CVE-2024-1490Shared CWE-94
CVE-2024-7419Shared CWE-94
CVE-2025-46581Shared CWE-94
CVE-2025-65037Shared CWE-94
CVE-2025-10679Shared CWE-94

References