CVE-2026-22206
Published: 26 February 2026
Description
SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL injection flaw combined with PHP tag processing to achieve remote…
more
code execution on the server.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the SQL injection vulnerability by requiring timely identification, reporting, and patching of flaws like those in SPIP prior to 4.4.10.
Prevents union-based SQL injection attacks by enforcing validation and sanitization of all user inputs processed into SQL queries.
Limits damage from low-privilege authenticated users exploiting the vulnerability by enforcing minimal permissions on application and database accounts.
Security SummaryAI
SPIP versions prior to 4.4.10 are affected by CVE-2026-22206, a SQL injection vulnerability (CWE-89) that enables authenticated low-privilege users to execute arbitrary SQL queries through union-based injection techniques. This flaw, published on 2026-02-26, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability arises in the context of SPIP, an open-source content management system, and can be chained with PHP tag processing to escalate to remote code execution on the server.
Low-privilege authenticated users, such as contributors or authors with minimal permissions, can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows attackers to execute arbitrary SQL queries, potentially extracting sensitive data, modifying database contents, or achieving full remote code execution by leveraging PHP tag processing mechanisms.
Advisories recommend updating to SPIP 4.4.10, as detailed in the official SPIP security blog post announcing the release. The SPIP Git repository provides the patched source code, while the VulnCheck advisory elaborates on the SQL injection leading to RCE via union-based techniques and PHP tags.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing SPIP CMS (T1190) allows low-privilege authenticated users to execute arbitrary SQL for data collection from databases (T1213.006) and chain to RCE for privilege escalation (T1068).