No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spip
Spip spip |
|
| Vendors & Products |
Spip
Spip spip |
Thu, 26 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal data. | |
| Title | SPIP < 4.4.10 Authentication Bypass via PHP Type Juggling | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-27T20:06:38.973Z
Reserved: 2026-01-06T16:47:17.185Z
Link: CVE-2026-22205
Updated: 2026-02-27T20:06:33.193Z
Status : Awaiting Analysis
Published: 2026-02-26T21:28:52.217
Modified: 2026-02-27T19:16:06.627
Link: CVE-2026-22205
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:04:14Z