Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22207: CWE-306 Missing Authentication for Critical Function in Volcengine OpenViking

0
Critical
VulnerabilityCVE-2026-22207cvecve-2026-22207cwe-306
Published: Thu Feb 26 2026 (02/26/2026, 20:34:30 UTC)
Source: CVE Database V5
Vendor/Project: Volcengine
Product: OpenViking

Description

OpenViking through version 0.1.18, prior to commit 0251c70, contains a broken access control vulnerability that allows unauthenticated attackers to gain ROOT privileges when the root_api_key configuration is omitted. Attackers can send requests to protected endpoints without authentication headers to access administrative functions including account management, resource operations, and system configuration.

AI-Powered Analysis

AILast updated: 02/26/2026, 22:53:30 UTC

Technical Analysis

CVE-2026-22207 is a critical security vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Volcengine's OpenViking software up to version 0.1.18. The flaw arises when the root_api_key configuration is omitted, causing the system to fail enforcing authentication on sensitive administrative API endpoints. This broken access control allows unauthenticated remote attackers to send requests to protected endpoints and gain root-level privileges. The compromised functions include account management, resource operations, and system configuration, which are critical for maintaining system integrity and security. The vulnerability does not require any authentication or user interaction, making it trivially exploitable over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects high impact on confidentiality, integrity, and availability with no attack complexity or privileges required. Although no public exploits have been reported yet, the severity and ease of exploitation make this a significant threat. The vulnerability was addressed in a commit identified as 0251c70, and users should upgrade to versions including this fix or later. Due to the nature of the vulnerability, attackers could fully compromise affected systems, leading to complete loss of control and potential lateral movement within organizational networks.

Potential Impact

The impact of CVE-2026-22207 is severe for organizations using vulnerable versions of OpenViking. Successful exploitation grants attackers root privileges, enabling full control over the system and all managed resources. This can lead to unauthorized data access, manipulation or deletion, disruption of services, and potential deployment of further malicious activities such as ransomware or espionage. The lack of authentication requirements means attackers can exploit this vulnerability remotely without any prior access, increasing the risk of widespread compromise. Organizations relying on OpenViking for cloud resource management or critical infrastructure are at high risk of operational disruption and data breaches. The vulnerability could also be leveraged to pivot into other parts of an enterprise network, amplifying the damage. Given the critical nature of the affected functions, the confidentiality, integrity, and availability of systems and data are all at significant risk.

Mitigation Recommendations

To mitigate CVE-2026-22207, organizations should immediately upgrade OpenViking to versions including the fix from commit 0251c70 or later. If upgrading is not immediately possible, implement strict network-level access controls to restrict access to OpenViking administrative endpoints only to trusted internal IPs or VPN users. Enable and enforce the root_api_key configuration to ensure authentication is required for all critical functions. Conduct thorough audits of existing OpenViking deployments to verify that no unauthorized access has occurred. Monitor logs for unusual or unauthorized API requests targeting administrative endpoints. Employ network segmentation to isolate systems running OpenViking from less trusted network zones. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthenticated access attempts to sensitive endpoints. Finally, maintain an incident response plan to quickly address any detected exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.186Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0cebb32ffcdb8a25eeabd

Added to database: 2/26/2026, 10:52:43 PM

Last enriched: 2/26/2026, 10:53:30 PM

Last updated: 2/26/2026, 11:55:46 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses