LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-27744

CVE-2026-27744 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: February 26, 2026

SPIP tickets plugin - Remote Code Execution

Published: February 25, 2026Updated: February 26, 2026Remote Exploitable

Overview

SPIP tickets plugin < 4.3.3 contains a remote code execution caused by unfiltered environment rendering in forum preview handling, letting unauthenticated attackers execute code via crafted content injection.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 22.5%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can execute arbitrary code on the web server, potentially leading to full server compromise.

Mitigation

Upgrade to version 4.3.3 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

šŸ”“ CVE-2026-27744 - Critical (9.8) The SPIP tickets plugin versions prior to 4.3.3 contain an unauthenticated remote code execution vulnerability in the forum preview handling for public ticket pages. The plugin appends untrusted request parameters into HTML that is later rendered... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-27744/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-27744
Severity
Critical
CVSS Score
9.8
Type
template_injection
Status
unconfirmed
EPSS
22.5%
Social Posts
1

CWE

  • CWE-94

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

22.5%Probability of exploitation in the next 30 days