ctipilot.ch

CERTFR-2026-AVI-0564 — SPIP < 4.4.14 multiple RCEs (public + private area)

campaign · advisory:certfr-2026-avi-0564

Coverage timeline
2
first 2026-05-13 → last 2026-05-13
Briefs
1
1 distinct
Sources cited
6
3 hosts
Sections touched
2
action_items, trending_vulns
Co-occurring entities
8
see Related entities below
2026-05-132 appearances2026-05-13

Story timeline

  1. 2026-05-13CTI Daily Brief — 2026-05-13
    trending_vulnsNew CERT-FR advisory 2026-05-12; widely deployed in French/Swiss-canton public-sector CMS.
  2. 2026-05-13CTI Daily Brief — 2026-05-13
    action_itemsAction item referencing in-brief detail.

Where this entity is cited

  • trending_vulns1
  • action_items1

Source distribution

  • cert.ssi.gouv.fr4 (67%)
  • blog.spip.net1 (17%)
  • thewatch.centreon.com1 (17%)

Related entities

Items in briefs about CERTFR-2026-AVI-0564 — SPIP < 4.4.14 multiple RCEs (public + private area) (5)

CERT-FR CERTFR-2026-ACT-016 — agentic AI three-risk-class advisory; defender obligations explicit

From CTI Weekly Summary — 2026-W19 (May 04 – May 10, 2026) · published 2026-05-13 · view item permalink →

CERT-FR's advisory (dated 13 April 2026, surfaced in this week's daily on 2026-05-08) names three operational risk classes for organisations deploying agentic AI orchestration platforms (Claude Agents, Microsoft Copilot Studio, AutoGen, MCP-server architectures): prompt injection via processed documents or websites (attacker embeds instructions in content the agent processes, redirecting its actions); MCP server supply-chain compromise (a malicious or compromised Model Context Protocol server can issue instructions to all connected agents); and insufficient sandboxing of agent execution environments. CERT-FR recommendations: input/output guardrails, strict allowlisting of permitted tool calls, human-in-the-loop gates for high-impact actions, and treating all AI agent outputs as untrusted until validated (CERT-FR — CERTFR-2026-ACT-016, 2026-05-08 · daily 2026-05-08). Why this is obligations-changing rather than routine advisory: for French public-sector entities deploying agentic AI, CERT-FR advisories establish the baseline a defendable-control posture is measured against. The Microsoft Semantic Kernel CVE-2026-26030 / CVE-2026-25592 pair (§ 3 deep dive) is the worked-example of CERT-FR's first and third risk classes manifesting as concrete vendor CVEs — defenders deploying any agentic-AI framework should treat the CERT-FR advisory as defining the question-set, not the answer-set.

CERTFR-2026-AVI-0564 — SPIP < 4.4.14: multiple RCEs (public and private area)

From CTI Daily Brief — 2026-05-13 · published 2026-05-13 · view item permalink →

CERT-FR's advisory CERTFR-2026-AVI-0564 (2026-05-12) covers multiple remote code execution flaws in SPIP — the open-source CMS that powers a substantial share of French ministry, université and francophone Swiss canton web sites (CERT-FR CERTFR-2026-AVI-0564, 2026-05-12; SPIP security bulletin, 2026-05-12). The SPIP bulletin describes two distinct RCE paths in versions prior to 4.4.14: one in the private (authenticated) area, and one in the public (unauthenticated) area "under specific nginx configurations" — the SPIP bulletin notes the bugs are "not covered by the security screen", meaning they bypass SPIP's built-in filter layer. No CVE identifiers are assigned in the vendor bulletin. Fixed in SPIP 4.4.14. No ITW reported. Detection concepts: monitor SPIP ecrire/ and front-end access logs for the SSTI / template-load gadget patterns the bulletin enumerates; on shared-host SPIP estates, audit the nginx reverse-proxy configuration for the unsafe location pattern. Hardening: upgrade to 4.4.14; on internet-facing SPIP, gate ecrire/ to a known admin source set at the reverse proxy.

CERTFR-2026-AVI-0572 — Centreon Infra Monitoring: RCE / SQLi / XSS cluster (April 2026 bulletin)

From CTI Daily Brief — 2026-05-13 · published 2026-05-13 · view item permalink →

CERT-FR's CERTFR-2026-AVI-0572 (2026-05-12) consolidates the April 2026 monthly security bulletin for Centreon Infra Monitoring — the enterprise monitoring platform widely deployed in French and EU public-sector NOCs and government ISPs (CERT-FR CERTFR-2026-AVI-0572, 2026-05-12; Centreon security bulletin, 2026-05-12). The bulletin lists command injection (effectively RCE in Centreon MBI), SQL injection, and XSS (Centreon Map, CVSS 6.8) findings spread across Centreon Anomaly Detection, Auto Discovery, AWIE, BAM, DSM, License Manager, MAP, MBI and Open Tickets — affecting 24.04.x (MBI only), 24.10.x and 25.10.x branches. Per-CVE identifiers are enumerated in the Centreon bulletin rather than the CERT-FR advisory. No ITW reported. The defender-relevant property is that Centreon stores privileged monitored-host credentials (SNMP communities, SSH private keys, vendor-API tokens) — compromise of a Centreon instance is a high-impact lateral-movement enabler against the entire monitored estate. Detection concepts: monitor Centreon front-end access logs for the listed component endpoints from non-NOC source networks; alert on Centreon process spawning child shells outside scheduled poller intervals. Hardening: apply the April 2026 monthly update; segment Centreon's monitoring VLAN from user / internet networks; treat Centreon credentials-vault contents as Tier-0 in the AD admin-tiering model.

CVE Summary Table

CVE Product CVSS EPSS KEV Exploited Patch Source
CVE-2026-44277 Fortinet FortiAuthenticator 6.5.x / 6.6.x / 8.0.x 9.1 n/a No No 6.5.7 / 6.6.9 / 8.0.3 PSIRT
CVE-2026-26083 Fortinet FortiSandbox 4.4.x / 5.0.x / PaaS / Cloud 9.1 n/a No No 4.4.9 / 5.0.2 / Cloud 5.0.6; Cloud 23/24 migrate PSIRT
CVE-2026-45185 Exim 4.97–4.99.2 (GnuTLS builds) 9.8 0.0 No No Exim 4.99.3 XBOW
CVE-2026-41089 Windows Netlogon (all supported Windows Server) 9.8 n/a No No May 2026 CU Tenable
CVE-2026-41096 Windows DNS Client (dnsapi.dll) 9.8 n/a No No May 2026 CU Tenable
CVE-2026-41103 Microsoft SSO Plugin for Jira/Confluence 9.1 n/a No No (More Likely) Plugin update 2026-05-12 Tenable
CVE-2026-42898 Microsoft Dynamics 365 On-Premises 9.9 n/a No No May 2026 CU ZDI
CVE-2026-40361 Microsoft Word (Preview Pane) 8.4 n/a No No (More Likely) Office 2026-05-12 Tenable
CVE-2026-40364 Microsoft Word (Preview Pane) 8.4 n/a No No (More Likely) Office 2026-05-12 Tenable
CVE-2026-34263 SAP Commerce Cloud HY_COM 2205 / COM_CLOUD 2211 9.6 n/a No No SAP Note 3733064 Onapsis
CVE-2026-34260 SAP S/4HANA SAP_BASIS 751–758 / 816 9.6 n/a No No SAP Note (May 2026 patch day) Onapsis

Vendor PSIRT pages (re-fetched at verification time) consistently publish CVSS 9.1 for both FortiAuthenticator CVE-2026-44277 and FortiSandbox CVE-2026-26083; early NCSC-CH / NVD reports cited 9.8 for one or both before convergence. § 7 documents the source discrepancy.

CERT-FR CERTFR-2026-ACT-016: Agentic AI tools introduce prompt-injection and supply-chain attack surfaces

From CTI Daily Brief — 2026-05-08 · published 2026-05-13 · view item permalink →

France's CERT-FR published advisory CERTFR-2026-ACT-016 warning that deploying agentic AI orchestration platforms (LLM-driven workflows with tool-calling, MCP server integration, or autonomous execution capabilities) introduces novel attack vectors. The advisory identifies three risk classes: prompt-injection via processed documents or websites (attacker embeds instructions in content the agent processes, redirecting its actions); MCP server supply-chain compromise (a malicious or compromised Model Context Protocol server can issue instructions to all connected agents); and insufficient sandboxing of agent execution environments, where agents with filesystem or network access can be weaponised. CERT-FR recommends input/output guardrails, strict allowlisting of permitted tool calls, human-in-the-loop gates for high-impact actions, and treating all AI agent outputs as untrusted until validated. Relevant for organisations deploying Claude Agents, Microsoft Copilot Studio, AutoGen, or similar agentic frameworks for workflow automation.

GLPI CERTFR-2026-AVI-0551 — Seven CVEs including SSRF and XSS in EU ITSM platform (advisory 2026-04-29)

From CTI Daily Brief — 2026-05-08 · published 2026-05-13 · view item permalink →

France's CERT-FR published CERTFR-2026-AVI-0551 (April 29, 2026) covering seven CVEs in GLPI, the open-source IT Service Management platform widely deployed in European public-sector organisations and healthcare networks. Vulnerability types include SSRF (CVE-2026-32312), stored and reflected XSS (CVE-2026-42317, CVE-2026-42318, CVE-2026-42320, CVE-2026-42321), security policy bypass (CVE-2026-5385), and data integrity compromise (CVE-2026-40108). CVSS scores are not published in the advisory. No exploitation in the wild is confirmed. GLPI administrators should upgrade to version ≥ 10.0.25 (10.0.x branch) or ≥ 11.0.7 (11.x branch). Swiss federal and cantonal administrations and hospitals using GLPI as their ITSM are advised to schedule patching within the standard change window.