CVE-2026-22205
Published: 26 February 2026
Summary
CVE-2026-22205 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Spip Spip. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Authorizing remote access reduces the ability to bypass authentication via unauthorized alternate remote channels.
Users can identify logons via alternate paths or channels by reviewing the previous logon time.
Adaptive requirements can apply across access paths, reducing the ability to bypass authentication via alternate channels or paths.
Centralized IdPs close alternate authentication paths that enable bypass.
Enforces authentication for non-organizational users, making it harder to bypass via alternate paths or channels.
Requires authentication to occur exclusively over the isolated trusted path, directly preventing bypass via alternate or untrusted channels.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Auth bypass in public-facing SPIP web app directly enables remote exploitation for unauthorized access to protected data.
NVD Description
SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal…
more
data.
Deeper analysisAI
CVE-2026-22205 is an authentication bypass vulnerability affecting SPIP versions prior to 4.4.10. The flaw stems from PHP type juggling in the authentication logic, where loose type comparisons allow attackers to bypass login verification and access protected information, including sensitive internal data. It is classified under CWE-288 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction. By leveraging the type juggling weakness, they can evade authentication checks to retrieve confidential data without impacting integrity or availability.
The official SPIP security advisory announces the release of version 4.4.10 as a patch addressing this issue. Security practitioners should upgrade to SPIP 4.4.10 or later, with further details available in the SPIP Git repository.
Details
- CWE(s)