FixVibe

// 探索 / 聚焦

SPIP Template RCE Version Exposure

Public SPIP version banners can reveal an RCE-class patch gap.

概要

Old CMS installations are still common in side projects, landing pages, and inherited customer sites. SPIP 3.1.2 and earlier have a template-tag handling vulnerability associated with remote code execution risk for authenticated attackers.

運作方式

The check extracts explicit SPIP version strings from `Composed-By` headers, generator meta tags, and early HTML markers. It does not upload files or attempt template execution.

影响范围

A vulnerable SPIP installation can turn compromised editor/admin credentials into server-side code execution. Public version banners also make the target easy to triage for attackers scanning older CMS estates.

// what fixvibe checks

What FixVibe checks

FixVibe maps externally visible application surfaces with passive signals and safe metadata checks. Reports summarize the exposed surface and remediation priorities. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

铁壁防御

Upgrade SPIP beyond 3.1.2, verify the deployed version directly, and remove stale public generator/version banners. Keep upload and template-management permissions restricted to trusted administrators.

// 在你自己的应用上跑一遍

放心继续发布,FixVibe 持续帮你看守风险。

FixVibe 像攻击者一样对你的应用公开面进行压力测试 —— 无代理、无安装、无信用卡。我们持续研究新的漏洞模式,并把它们转化成实用检查和可直接用于 Cursor、Claude、Copilot 的修复方案。

探索
129
本类别中触发的测试
模块
12
专属 探索 检查
每次扫描
384+
跨所有类别的测试
  • 免费 —— 无需信用卡,无需安装,无需 Slack 通知
  • 只需粘贴 URL —— 我们爬取、探测、生成报告
  • 按严重程度分级,去重至只剩信号
  • 最新 AI 修复提示词,可直接粘贴到 Cursor、Claude、Copilot
运行免费扫描

// 最新检查 · 实用修复 · 安心发布

SPIP Template RCE Version Exposure — 漏洞聚焦 | FixVibe · FixVibe