(from an alert posted on “spip-ann” mailing list)
A big security issue has just been discovered : this issue affects all SPIP versions from 2.0.x to 2.0.8, the branch 1.9 is also affected. This breach lets a hacker with no password at all, to take control on the SPIP website and on the web server.
This alert is to be taken seriously, as it has not been discovered by someone “nice” but by a real “naughty one” who took control on an existing website in order to insert malwares on it.
We publish today 2 new maintenance versions for SPIP, which fix this issue :
- SPIP 2.0.9, latest official and stable version, which offers the fix and a list of improvments listed below.
- SPIP 1.9.2i, maintenance version for the branch 1.9.2
Download them at : http://files.spip.org/spip/stable/
or, if you wish to use spip_loader : http://xxx.example.tld/spip_loader.php
For security specialists, the lone security patch, which corrects nothing else but the issue and does not bring any other improvment, can be found at :
Check revisions     and .
For the branch 1.9.2x patch is available there :
Security Screen :
If you have no way to upgrade completely at once, we suggest you to fix the breach as soon as possible by installing on your SPIP website the “security screen”. You can discover this at :
This “screen” lets you block certain attacks without the need of upgrading SPIP.
This issue was found and analysed by Thomas Sutton et Pierre Rousset.
We also feel free to remind you that, the best way to let us know about a security issue with SPIP is to send a mail at spip-team [AT] rezo.net