Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22890: CWE-522 in EV2GO ev2go.io

0
Medium
VulnerabilityCVE-2026-22890cvecve-2026-22890cwe-522
Published: Thu Feb 26 2026 (02/26/2026, 23:50:56 UTC)
Source: CVE Database V5
Vendor/Project: EV2GO
Product: ev2go.io

Description

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:57:03 UTC

Technical Analysis

CVE-2026-22890 identifies a vulnerability in EV2GO's ev2go.io platform, where authentication identifiers for charging stations are exposed publicly via web-based mapping services. This vulnerability is classified under CWE-522, which concerns insufficiently protected credentials. The exposure allows any remote attacker to access sensitive authentication identifiers without requiring privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability affects all versions of the product, indicating a systemic design or configuration flaw. Although no exploits have been reported in the wild, the publicly accessible authentication data could enable attackers to impersonate legitimate users or devices, potentially leading to unauthorized control or manipulation of EV charging stations. This could compromise the confidentiality and integrity of the charging infrastructure, though availability impact is not indicated. The vulnerability was published on February 26, 2026, and has a CVSS v3.1 score of 6.5, categorized as medium severity. The lack of patches or mitigations currently listed suggests that organizations must implement compensating controls to protect their infrastructure. The exposure via web-based mapping platforms suggests that the identifiers are either embedded in publicly accessible APIs or displayed on maps without adequate access restrictions, highlighting a need for improved data handling and access control policies within EV2GO's ecosystem.

Potential Impact

The primary impact of CVE-2026-22890 is the exposure of authentication identifiers for EV charging stations, which can lead to unauthorized access or manipulation of these stations. This compromises confidentiality by revealing sensitive credentials and integrity by enabling potential unauthorized commands or configurations. While availability is not directly affected, unauthorized control could indirectly disrupt charging services. For organizations operating EV2GO charging infrastructure, this vulnerability could result in operational disruptions, financial losses, reputational damage, and potential safety risks if charging stations are manipulated maliciously. The exposure also raises privacy concerns for users relying on these stations. Given the increasing adoption of electric vehicles globally, the vulnerability poses a significant risk to critical EV infrastructure, especially in regions with high EV penetration and reliance on EV2GO services. Attackers could leverage this information for targeted attacks, including fraudulent charging sessions or denial of service through indirect means. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the threat landscape.

Mitigation Recommendations

To mitigate CVE-2026-22890, organizations should immediately audit and restrict access to authentication identifiers on all web-based mapping platforms and APIs associated with EV2GO services. EV2GO should implement strict access controls, ensuring that sensitive identifiers are never publicly exposed or embedded in publicly accessible resources. Employing tokenization or encryption for authentication data in transit and at rest is critical. Organizations should monitor network traffic and logs for unusual access patterns to charging station credentials. Implementing multi-factor authentication and anomaly detection on charging station management systems can reduce the risk of unauthorized access. EV2GO should prioritize releasing patches or updates that remove or obfuscate authentication identifiers from public interfaces. Additionally, organizations should engage in threat hunting and incident response preparedness specific to EV infrastructure. Collaboration with EV2GO and relevant cybersecurity authorities to share intelligence and coordinate response efforts is recommended. Finally, educating staff and users about the risks associated with exposed credentials can help reduce social engineering or related attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-23T23:41:36.723Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0e11f32ffcdb8a28c2705

Added to database: 2/27/2026, 12:11:11 AM

Last enriched: 3/6/2026, 8:57:03 PM

Last updated: 4/12/2026, 8:07:08 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses