Cyber Posture

CVE-2026-22197

HighPublic PoC

Published: 09 January 2026

Published
09 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0002 5.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22197 is a high-severity SQL Injection (CWE-89) vulnerability in Gestsup Gestsup. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates vulnerable request parameters for filtering, searching, and sorting before incorporation into SQL queries, preventing SQL injection exploitation.

prevent

Remediates the specific SQL injection flaws by identifying, testing, and installing the vendor-provided upgrade to GestSup 3.2.60 or later.

preventdetect

Scans for vulnerabilities like this SQL injection in asset list functionality and remediates them based on risk assessments.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in a network-accessible web application directly enables exploitation of public-facing apps (T1190) and unauthorized data access from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GestSup versions prior to 3.2.60 contain multiple SQL injection vulnerabilities in the asset list functionality. Multiple request parameters used to filter, search, or sort assets are incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database…

more

queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

Deeper analysisAI

CVE-2026-22197 is a set of multiple SQL injection vulnerabilities (CWE-89) affecting GestSup versions prior to 3.2.60, specifically in the asset list functionality. Request parameters used for filtering, searching, or sorting assets are directly incorporated into SQL queries without adequate neutralization or sanitization. The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), highlighting its high severity due to network accessibility and low complexity.

An authenticated attacker with low privileges (PR:L) can exploit these SQL injections remotely over the network without user interaction. By manipulating the vulnerable parameters, they can alter SQL queries to achieve unauthorized access to sensitive database contents or modify data, with impacts limited by the attacker's database privileges. Exploitation does not affect availability.

Mitigation guidance from the vendor's changelog at https://gestsup.fr/index.php?page=changelog and the VulnCheck advisory at https://www.vulncheck.com/advisories/gestsup-multiple-sqli-in-asset-list recommends upgrading to GestSup version 3.2.60 or later, where the SQL injection issues in the asset list have been addressed.

Details

CWE(s)

Affected Products

gestsup
gestsup
≤ 3.2.56

CVEs Like This One

CVE-2026-22195Same product: Gestsup Gestsup
CVE-2026-22196Same product: Gestsup Gestsup
CVE-2026-22194Same product: Gestsup Gestsup
CVE-2026-23492Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2025-25116Shared CWE-89
CVE-2025-52025Shared CWE-89
CVE-2025-56316Shared CWE-89
CVE-2026-0702Shared CWE-89
CVE-2025-67146Shared CWE-89

References