CVE-2026-22205
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
2Tags
Description
SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal data.
Analysis
Spip versions up to 4.4.10 contains a vulnerability that allows attackers to access protected information (CVSS 7.5).
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all SPIP installations and identify affected versions (≤4.4.10); assess what sensitive data each instance handles. Within 7 days: Implement network segmentation to restrict SPIP access to authorized users only; deploy WAF rules to block exploitation patterns; disable non-critical SPIP features if feasible. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today