CVE-2026-22890: CWE-522 in EV2GO ev2go.io
CVE-2026-22890 is a medium severity vulnerability affecting all versions of EV2GO's ev2go. io platform. It involves the exposure of charging station authentication identifiers through publicly accessible web-based mapping platforms, classified under CWE-522 (Insufficiently Protected Credentials). This vulnerability allows unauthorized parties to access sensitive authentication data without requiring authentication or user interaction. While no known exploits are currently active in the wild, the exposure could lead to unauthorized use or manipulation of charging stations. The vulnerability has a CVSS score of 6. 5, indicating a moderate risk primarily impacting confidentiality and integrity. Organizations relying on EV2GO's platform should prioritize securing these identifiers and monitoring for suspicious activity. Countries with significant EV2GO infrastructure and electric vehicle adoption are at higher risk. Immediate mitigation involves restricting public access to authentication identifiers and enhancing credential protection mechanisms.
AI Analysis
Technical Summary
CVE-2026-22890 is a vulnerability identified in EV2GO's ev2go.io platform, affecting all versions of the product. The core issue is the exposure of charging station authentication identifiers via web-based mapping platforms that are publicly accessible. This vulnerability is categorized under CWE-522, which refers to insufficient protection of credentials. Essentially, authentication identifiers that should be confidential are instead openly available, allowing any user or attacker to retrieve them without authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity level. The vector indicates that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality and integrity (C:L/I:L) but not availability (A:N). The exposure of these identifiers could enable unauthorized access to charging stations, potentially allowing attackers to manipulate charging sessions, cause billing fraud, or disrupt service integrity. Although no known exploits are currently reported in the wild, the public availability of sensitive credentials represents a significant security risk. The vulnerability affects all versions of EV2GO's platform, indicating a systemic issue in how authentication data is handled and displayed on mapping services. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps by users and administrators.
Potential Impact
The primary impact of CVE-2026-22890 is the compromise of confidentiality and integrity of charging station authentication credentials. Unauthorized access to these identifiers can lead to several adverse outcomes: attackers could initiate unauthorized charging sessions, resulting in financial losses or billing fraud; they might manipulate charging station operations, causing service disruptions or damage to infrastructure; and the integrity of user data and charging records could be undermined. For organizations operating or managing EV2GO charging stations, this vulnerability could erode customer trust and lead to regulatory compliance issues, especially in jurisdictions with strict data protection laws. The exposure of credentials on public mapping platforms increases the attack surface, making it easier for threat actors to identify and target vulnerable stations. While availability is not directly impacted, indirect effects such as operational disruptions could occur if attackers exploit the credentials to interfere with services. The medium CVSS score reflects a balanced risk, but the widespread use of EV2GO in regions with growing electric vehicle infrastructure elevates the potential impact. Organizations worldwide that depend on EV2GO's platform for charging station management must consider this vulnerability seriously to prevent unauthorized access and maintain service reliability.
Mitigation Recommendations
To mitigate CVE-2026-22890 effectively, organizations should implement several targeted measures beyond generic advice: 1) Immediately audit and restrict access to authentication identifiers on all web-based mapping platforms, ensuring these credentials are not publicly exposed or indexed by search engines. 2) Implement strong access controls and encryption for authentication data both at rest and in transit, preventing unauthorized retrieval or interception. 3) Coordinate with EV2GO to obtain patches or updates that address the root cause of credential exposure as soon as they become available. 4) Employ network segmentation and monitoring around charging station infrastructure to detect and block unauthorized access attempts using exposed credentials. 5) Regularly rotate authentication identifiers and credentials to limit the window of opportunity for attackers exploiting leaked data. 6) Educate staff and users about the risks associated with credential exposure and encourage reporting of suspicious activity. 7) Use anomaly detection systems to identify unusual charging patterns or access that may indicate exploitation of this vulnerability. 8) Engage with mapping platform providers to remove or restrict sensitive data visibility related to charging stations. These steps collectively reduce the risk of exploitation and help maintain the confidentiality and integrity of charging station operations.
Affected Countries
United States, Germany, Netherlands, France, United Kingdom, China, Japan, South Korea, Canada, Norway, Sweden, Australia
CVE-2026-22890: CWE-522 in EV2GO ev2go.io
Description
CVE-2026-22890 is a medium severity vulnerability affecting all versions of EV2GO's ev2go. io platform. It involves the exposure of charging station authentication identifiers through publicly accessible web-based mapping platforms, classified under CWE-522 (Insufficiently Protected Credentials). This vulnerability allows unauthorized parties to access sensitive authentication data without requiring authentication or user interaction. While no known exploits are currently active in the wild, the exposure could lead to unauthorized use or manipulation of charging stations. The vulnerability has a CVSS score of 6. 5, indicating a moderate risk primarily impacting confidentiality and integrity. Organizations relying on EV2GO's platform should prioritize securing these identifiers and monitoring for suspicious activity. Countries with significant EV2GO infrastructure and electric vehicle adoption are at higher risk. Immediate mitigation involves restricting public access to authentication identifiers and enhancing credential protection mechanisms.
AI-Powered Analysis
Technical Analysis
CVE-2026-22890 is a vulnerability identified in EV2GO's ev2go.io platform, affecting all versions of the product. The core issue is the exposure of charging station authentication identifiers via web-based mapping platforms that are publicly accessible. This vulnerability is categorized under CWE-522, which refers to insufficient protection of credentials. Essentially, authentication identifiers that should be confidential are instead openly available, allowing any user or attacker to retrieve them without authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity level. The vector indicates that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality and integrity (C:L/I:L) but not availability (A:N). The exposure of these identifiers could enable unauthorized access to charging stations, potentially allowing attackers to manipulate charging sessions, cause billing fraud, or disrupt service integrity. Although no known exploits are currently reported in the wild, the public availability of sensitive credentials represents a significant security risk. The vulnerability affects all versions of EV2GO's platform, indicating a systemic issue in how authentication data is handled and displayed on mapping services. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps by users and administrators.
Potential Impact
The primary impact of CVE-2026-22890 is the compromise of confidentiality and integrity of charging station authentication credentials. Unauthorized access to these identifiers can lead to several adverse outcomes: attackers could initiate unauthorized charging sessions, resulting in financial losses or billing fraud; they might manipulate charging station operations, causing service disruptions or damage to infrastructure; and the integrity of user data and charging records could be undermined. For organizations operating or managing EV2GO charging stations, this vulnerability could erode customer trust and lead to regulatory compliance issues, especially in jurisdictions with strict data protection laws. The exposure of credentials on public mapping platforms increases the attack surface, making it easier for threat actors to identify and target vulnerable stations. While availability is not directly impacted, indirect effects such as operational disruptions could occur if attackers exploit the credentials to interfere with services. The medium CVSS score reflects a balanced risk, but the widespread use of EV2GO in regions with growing electric vehicle infrastructure elevates the potential impact. Organizations worldwide that depend on EV2GO's platform for charging station management must consider this vulnerability seriously to prevent unauthorized access and maintain service reliability.
Mitigation Recommendations
To mitigate CVE-2026-22890 effectively, organizations should implement several targeted measures beyond generic advice: 1) Immediately audit and restrict access to authentication identifiers on all web-based mapping platforms, ensuring these credentials are not publicly exposed or indexed by search engines. 2) Implement strong access controls and encryption for authentication data both at rest and in transit, preventing unauthorized retrieval or interception. 3) Coordinate with EV2GO to obtain patches or updates that address the root cause of credential exposure as soon as they become available. 4) Employ network segmentation and monitoring around charging station infrastructure to detect and block unauthorized access attempts using exposed credentials. 5) Regularly rotate authentication identifiers and credentials to limit the window of opportunity for attackers exploiting leaked data. 6) Educate staff and users about the risks associated with credential exposure and encourage reporting of suspicious activity. 7) Use anomaly detection systems to identify unusual charging patterns or access that may indicate exploitation of this vulnerability. 8) Engage with mapping platform providers to remove or restrict sensitive data visibility related to charging stations. These steps collectively reduce the risk of exploitation and help maintain the confidentiality and integrity of charging station operations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-02-23T23:41:36.723Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0e11f32ffcdb8a28c2705
Added to database: 2/27/2026, 12:11:11 AM
Last enriched: 2/27/2026, 12:27:18 AM
Last updated: 2/27/2026, 1:32:35 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3274: Buffer Overflow in Tenda F453
HighCVE-2026-3037: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25721: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25196: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25105: CWE-78 in Copeland Copeland XWEB 300D PRO
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.