Home

Description

SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal data.

PUBLISHED Reserved 2026-01-06 | Published 2026-02-26 | Updated 2026-02-26 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-288 Authentication Bypass Using an Alternate Path or Channel

Product status

Default status
unaffected

Any version before 4.4.10
affected

Credits

Arthur Deloffre (Vozec) finder

Louka Jacques-Chevallier (Laluka) finder

References

blog.spip.net/...jour-de-securite-sortie-de-SPIP-4-4-10.html vendor-advisory patch

git.spip.net/spip/spip product

www.vulncheck.com/...ip-sql-injection-rce-via-union-php-tags third-party-advisory

cve.org (CVE-2026-22205)

nvd.nist.gov (CVE-2026-22205)

Download JSON