Cyber Posture

CVE-2026-22206

HighPublic PoC

Published: 26 February 2026

Published
26 February 2026
Modified
02 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 43.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL injection flaw combined with PHP tag processing to achieve remote…

more

code execution on the server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the SQL injection vulnerability by requiring timely identification, reporting, and patching of flaws like those in SPIP prior to 4.4.10.

prevent

Prevents union-based SQL injection attacks by enforcing validation and sanitization of all user inputs processed into SQL queries.

prevent

Limits damage from low-privilege authenticated users exploiting the vulnerability by enforcing minimal permissions on application and database accounts.

Security SummaryAI

SPIP versions prior to 4.4.10 are affected by CVE-2026-22206, a SQL injection vulnerability (CWE-89) that enables authenticated low-privilege users to execute arbitrary SQL queries through union-based injection techniques. This flaw, published on 2026-02-26, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability arises in the context of SPIP, an open-source content management system, and can be chained with PHP tag processing to escalate to remote code execution on the server.

Low-privilege authenticated users, such as contributors or authors with minimal permissions, can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows attackers to execute arbitrary SQL queries, potentially extracting sensitive data, modifying database contents, or achieving full remote code execution by leveraging PHP tag processing mechanisms.

Advisories recommend updating to SPIP 4.4.10, as detailed in the official SPIP security blog post announcing the release. The SPIP Git repository provides the patched source code, while the VulnCheck advisory elaborates on the SQL injection leading to RCE via union-based techniques and PHP tags.

Details

CWE(s)

Affected Products

spip
spip
≤ 4.4.10

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing SPIP CMS (T1190) allows low-privilege authenticated users to execute arbitrary SQL for data collection from databases (T1213.006) and chain to RCE for privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References