Background: Recent population-based cohort studies have questioned the role of pneumococci as the most frequent pathogen causing severe infection in patients after splenectomy. The aim of the study was to define the causative pathogens and clinical presentation of patients with overwhelming postsplenectomy infection (OPSI).
Methods: In a prospective cohort study in 173 German intensive care units, we searched for patients with and without asplenia and community-acquired severe sepsis/septic shock. Clinical and laboratory variables and survival of patients were assessed.
Results: Fifty-two patients with severe sepsis or septic shock with asplenia and 52 without asplenia were included. OPSI patients more often had a history of malignancy (38% vs 17%; P = .016) and had a lower body mass index (24 kg/m(2) vs 28 kg/m(2); P = .004). Streptococcus pneumoniae was detected more frequently in OPSI patients (42% vs 12% without asplenia; P < .001) and more frequently manifested as bloodstream infection (31% vs 6%; P = .002). Gram-negative infection was similar in both groups (12% vs 19%; P = .157). Pneumococcal vaccine coverage of OPSI patients was low overall (42% vs 8% among patients without asplenia; P < .001). Purpura fulminans was a frequent complication, developing in 19% of OPSI patients vs 5% of patients without asplenia (P = .038). The interval between splenectomy and OPSI was 6 years (range, 1 month-50 years). On multivariable Poisson regression, asplenia was the only predictive variable independently associated with pneumococcal sepsis (adjusted relative risk, 2.53 [95% confidence interval, 1.06-6.08]).
Conclusions: Pneumococcal infections remain the most important cause of severe sepsis and septic shock following splenectomy.
Keywords: Streptococcus pneumoniae; asplenia; overwhelming postsplenectomy infection; pneumococcal vaccine; splenectomy.
© The Author 2015. Published by Oxford University Press for the Infectious Diseases Society of America. All rights reserved. For permissions, e-mail journals.permissions@oup.com.