CVE-2026-22195
Published: 09 January 2026
Summary
CVE-2026-22195 is a high-severity SQL Injection (CWE-89) vulnerability in Gestsup Gestsup. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the SQL injection by requiring validation and neutralization of user-controlled search inputs before incorporation into database queries.
Ensures timely patching of the specific SQL injection flaw in GestSup versions prior to 3.2.60 as identified in vendor changelog and advisories.
Limits the impact of successful SQL injection exploitation by enforcing least privilege on database accounts used by the application.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web app search directly enables remote exploitation of public-facing application (T1190) and unauthorized database data access/modification (T1213.006).
NVD Description
GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in the search bar functionality. User-controlled search input is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized…
more
access to or modification of database contents depending on database privileges.
Deeper analysisAI
CVE-2026-22195 is a SQL injection vulnerability (CWE-89) in GestSup versions prior to 3.2.60. The issue affects the search bar functionality, where user-controlled search input is incorporated into SQL queries without sufficient neutralization, enabling manipulation of database queries.
An authenticated attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N) required. Successful exploitation allows the attacker to achieve high impacts on confidentiality and integrity (C:H/I:H), such as unauthorized access to or modification of database contents, depending on the attacker's database privileges. The CVSS v3.1 base score is 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
Mitigation details are available in the vendor's changelog at https://gestsup.fr/index.php?page=changelog and the VulnCheck advisory at https://www.vulncheck.com/advisories/gestsup-sqli-in-search-bar, which cover patches addressing the SQL injection in versions 3.2.60 and later.
Details
- CWE(s)