CVE-2026-22195

8.1 HIGH

📋 TL;DR

GestSup versions before 3.2.60 contain a SQL injection vulnerability in the search bar functionality. Authenticated attackers can manipulate database queries through user-controlled search input, potentially accessing or modifying sensitive data. All organizations running vulnerable GestSup versions are affected.

💻 Affected Systems

Products:
  • GestSup
Versions: All versions prior to 3.2.60
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit the search functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, or deletion, potentially leading to privilege escalation or full system takeover depending on database permissions.

🟠

Likely Case

Unauthorized access to sensitive ticket data, user information, or configuration details stored in the database.

🟢

If Mitigated

Limited impact due to proper input validation, parameterized queries, or database user restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with readily available tools. Authentication requirement reduces immediate risk but doesn't prevent exploitation by malicious insiders or compromised accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.60

Vendor Advisory: https://gestsup.fr/index.php?page=changelog

Restart Required: No

Instructions:

1. Backup your GestSup installation and database. 2. Download version 3.2.60 or later from the official GestSup website. 3. Follow the standard GestSup upgrade procedure. 4. Verify the update was successful by checking the version number.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize search parameters before processing.

Web Application Firewall Rules

all

Deploy WAF rules to detect and block SQL injection patterns in search requests.

🧯 If You Can't Patch

  • Restrict database user permissions to minimum required for application functionality.
  • Implement network segmentation to isolate the GestSup server from sensitive systems.

🔍 How to Verify

Check if Vulnerable:

Check GestSup version in administration panel or by examining the application files. Versions below 3.2.60 are vulnerable.

Check Version:

Check GestSup admin interface or examine version.php file in installation directory.

Verify Fix Applied:

Confirm version is 3.2.60 or higher in administration panel and test search functionality with safe inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual search queries containing SQL syntax like UNION, SELECT, INSERT, or database commands
  • Multiple failed login attempts followed by search activity
  • Search queries with unusual length or special characters

Network Indicators:

  • HTTP POST requests to search endpoints containing SQL keywords or special characters
  • Abnormal database query patterns from application server

SIEM Query:

source="gestup_logs" AND (message="*SELECT*" OR message="*UNION*" OR message="*INSERT*")

🔗 References

📤 Share & Export