Cyber Posture

CVE-2026-22195

HighPublic PoC

Published: 09 January 2026

Published
09 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0002 4.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22195 is a high-severity SQL Injection (CWE-89) vulnerability in Gestsup Gestsup. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the SQL injection by requiring validation and neutralization of user-controlled search inputs before incorporation into database queries.

prevent

Ensures timely patching of the specific SQL injection flaw in GestSup versions prior to 3.2.60 as identified in vendor changelog and advisories.

prevent

Limits the impact of successful SQL injection exploitation by enforcing least privilege on database accounts used by the application.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in web app search directly enables remote exploitation of public-facing application (T1190) and unauthorized database data access/modification (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in the search bar functionality. User-controlled search input is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized…

more

access to or modification of database contents depending on database privileges.

Deeper analysisAI

CVE-2026-22195 is a SQL injection vulnerability (CWE-89) in GestSup versions prior to 3.2.60. The issue affects the search bar functionality, where user-controlled search input is incorporated into SQL queries without sufficient neutralization, enabling manipulation of database queries.

An authenticated attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N) required. Successful exploitation allows the attacker to achieve high impacts on confidentiality and integrity (C:H/I:H), such as unauthorized access to or modification of database contents, depending on the attacker's database privileges. The CVSS v3.1 base score is 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

Mitigation details are available in the vendor's changelog at https://gestsup.fr/index.php?page=changelog and the VulnCheck advisory at https://www.vulncheck.com/advisories/gestsup-sqli-in-search-bar, which cover patches addressing the SQL injection in versions 3.2.60 and later.

Details

CWE(s)

Affected Products

gestsup
gestsup
≤ 3.2.56

CVEs Like This One

CVE-2026-22197Same product: Gestsup Gestsup
CVE-2026-22196Same product: Gestsup Gestsup
CVE-2026-22194Same product: Gestsup Gestsup
CVE-2026-23492Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2025-25116Shared CWE-89
CVE-2025-52025Shared CWE-89
CVE-2025-56316Shared CWE-89
CVE-2026-0702Shared CWE-89
CVE-2025-67146Shared CWE-89

References