CVE-2026-22197
📋 TL;DR
This SQL injection vulnerability in GestSup allows authenticated attackers to manipulate database queries through asset list parameters. Attackers can access or modify database contents depending on their privileges. All GestSup instances running versions before 3.2.60 are affected.
💻 Affected Systems
- GestSup
📦 What is this software?
Gestsup by Gestsup
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, modification, or deletion; potential privilege escalation to administrative access; possible remote code execution if database supports stored procedures.
Likely Case
Unauthorized access to sensitive asset data, user information, and configuration details; potential data manipulation affecting business operations.
If Mitigated
Limited to authenticated user's data scope; database-level controls prevent privilege escalation; query results are sanitized before display.
🎯 Exploit Status
SQL injection is well-understood; authenticated access required; parameter manipulation is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2.60
Vendor Advisory: https://gestsup.fr/index.php?page=changelog
Restart Required: Yes
Instructions:
1. Backup your GestSup database and configuration. 2. Download version 3.2.60 or later from official GestSup website. 3. Follow upgrade instructions in GestSup documentation. 4. Restart the GestSup service. 5. Verify the update completed successfully.
🔧 Temporary Workarounds
Input Validation Filter
allImplement web application firewall or input validation to block SQL injection patterns in asset list parameters
Database Privilege Reduction
allRestrict database user permissions to read-only for application accounts
GRANT SELECT ON gestsup.* TO 'appuser'@'localhost';
REVOKE INSERT, UPDATE, DELETE, DROP, CREATE ON gestsup.* FROM 'appuser'@'localhost';
🧯 If You Can't Patch
- Implement strict input validation for all asset list parameters using allowlists
- Deploy web application firewall with SQL injection protection rules
🔍 How to Verify
Check if Vulnerable:
Check GestSup version in administration panel or by examining the application files; versions below 3.2.60 are vulnerable
Check Version:
Check GestSup admin interface or examine version.php file in installation directory
Verify Fix Applied:
Confirm version is 3.2.60 or higher in administration panel; test asset list functionality with SQL injection test payloads
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL query patterns in database logs
- Multiple failed login attempts followed by asset list access
- Asset list requests with SQL keywords in parameters
Network Indicators:
- HTTP requests to asset list endpoints containing SQL syntax in parameters
- Unusual database query volume from application server
SIEM Query:
source="web_logs" AND (uri="*asset*" OR uri="*liste*") AND (param="*SELECT*" OR param="*UNION*" OR param="*OR 1=1*")