CVE-2026-22194
📋 TL;DR
GestSup versions up to 3.2.60 contain a CSRF vulnerability that allows attackers to trick authenticated users into performing unauthorized actions. An attacker can exploit this to create privileged administrative accounts by targeting the user creation endpoint. All users running vulnerable versions are affected.
💻 Affected Systems
- GestSup
📦 What is this software?
Gestsup by Gestsup
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the GestSup instance through creation of administrative accounts, leading to data theft, system takeover, or further attacks.
Likely Case
Unauthorized creation of privileged accounts leading to data exposure, privilege escalation, and potential lateral movement within the system.
If Mitigated
Limited impact with proper CSRF protections, though some risk remains if other vulnerabilities exist.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated users into visiting malicious pages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2.61 or later
Vendor Advisory: https://gestsup.fr/index.php?page=changelog
Restart Required: No
Instructions:
1. Backup your GestSup installation and database. 2. Download the latest version from the official website. 3. Replace the existing files with the updated version. 4. Verify the update by checking the version number.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF protection tokens to all state-changing requests
SameSite Cookie Attribute
allSet SameSite=Strict attribute on session cookies
🧯 If You Can't Patch
- Implement web application firewall rules to detect and block CSRF attempts
- Restrict administrative access to specific IP addresses or networks
🔍 How to Verify
Check if Vulnerable:
Check GestSup version number in admin panel or configuration files
Check Version:
Check version in GestSup admin interface or config files
Verify Fix Applied:
Verify version is 3.2.61 or higher and test CSRF protection on user creation endpoint
📡 Detection & Monitoring
Log Indicators:
- Multiple user creation attempts from same IP
- Unusual administrative account creation
Network Indicators:
- HTTP POST requests to user creation endpoint without referrer headers
- Requests with missing CSRF tokens
SIEM Query:
source="gestup" AND (event="user_creation" OR event="admin_action") AND user_agent="*malicious*"