Cyber Posture

CVE-2026-22207

CriticalPublic PoC

Published: 26 February 2026

Published
26 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0031 54.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22207 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 requires enforcement of approved authorizations for access to system resources, directly addressing the failure to enforce authentication on protected endpoints.

prevent

AC-14 mandates identification and restriction of actions permitted without identification or authentication, preventing administrative functions from being accessible unauthenticated.

prevent

AC-6 enforces least privilege to limit access to only necessary privileges, mitigating the impact of unauthorized root privilege escalation even if authentication is bypassed.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote attackers to bypass authentication and gain root privileges via protected API endpoints in a network-accessible service, directly enabling exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

OpenViking through version 0.1.18, prior to commit 0251c70, contains a broken access control vulnerability that allows unauthenticated attackers to gain ROOT privileges when the root_api_key configuration is omitted. Attackers can send requests to protected endpoints without authentication headers to access…

more

administrative functions including account management, resource operations, and system configuration.

Deeper analysisAI

CVE-2026-22207 is a broken access control vulnerability (CWE-306) affecting OpenViking through version 0.1.18, prior to commit 0251c7045b3f8092c4d2e1565115b1ba23db282f. The issue arises when the root_api_key configuration is omitted, enabling unauthenticated attackers to bypass authentication and access protected endpoints. This flaw has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high confidentiality, integrity, and availability impacts.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required. By sending requests to protected endpoints without authentication headers, they can gain root privileges and perform administrative functions, including account management, resource operations, and system configuration.

Mitigation involves updating to the fixed commit 0251c7045b3f8092c4d2e1565115b1ba23db282f or later, as detailed in the project's GitHub repository. The vulnerability was reported in issue #302 and addressed via pull request #310. Additional guidance is available in the VulnCheck advisory at https://www.vulncheck.com/advisories/openviking-missing-root-api-key-allows-anonymous-root-access.

Details

CWE(s)

CVEs Like This One

CVE-2026-26340Shared CWE-306
CVE-2025-54816Shared CWE-306
CVE-2025-53072Shared CWE-306
CVE-2026-4640Shared CWE-306
CVE-2026-40884Shared CWE-306
CVE-2026-34279Shared CWE-306
CVE-2026-44413Shared CWE-306
CVE-2026-34286Shared CWE-306
CVE-2025-68715Shared CWE-306
CVE-2026-2624Shared CWE-306

References