{"id":"CVE-2026-22206","details":"SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL injection flaw combined with PHP tag processing to achieve remote code execution on the server.","modified":"2026-03-15T22:51:50.737056Z","published":"2026-02-26T21:28:52.397Z","references":[{"type":"WEB","url":"https://git.spip.net/spip/spip"},{"type":"ADVISORY","url":"https://www.vulncheck.com/advisories/spip-sql-injection-rce-via-union-php-tags"},{"type":"ADVISORY","url":"https://blog.spip.net/Mise-a-jour-de-securite-sortie-de-SPIP-4-4-10.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.spip.net/spip/spip","events":[{"introduced":"0"},{"fixed":"020fb398ca507b9d9dce6d3b25908b340998a17b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.4.10"}]}}],"versions":["4.4.0","4.4.0-beta","4.4.0-beta2","4.4.0-beta3","4.4.0-beta4","4.4.1","4.4.2","4.4.3","4.4.4","4.4.5","4.4.6","4.4.7","4.4.8","4.4.9","v3.0.0-beta.2","v3.1.0-alpha","v3.1.0-beta","v4.0.0-alpha","v4.0.0-beta","v4.2.0","v4.2.0-alpha","v4.2.0-alpha2","v4.2.1","v4.2.10","v4.2.11","v4.2.2","v4.2.3","v4.2.4","v4.2.5","v4.2.6","v4.2.7","v4.2.8","v4.2.9","v4.3.0-alpha","v4.3.0-alpha2","v4.3.0-beta"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22206.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}