CVE-2026-22197
Published: 09 January 2026
Summary
CVE-2026-22197 is a high-severity SQL Injection (CWE-89) vulnerability in Gestsup Gestsup. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates vulnerable request parameters for filtering, searching, and sorting before incorporation into SQL queries, preventing SQL injection exploitation.
Remediates the specific SQL injection flaws by identifying, testing, and installing the vendor-provided upgrade to GestSup 3.2.60 or later.
Scans for vulnerabilities like this SQL injection in asset list functionality and remediates them based on risk assessments.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a network-accessible web application directly enables exploitation of public-facing apps (T1190) and unauthorized data access from databases (T1213.006).
NVD Description
GestSup versions prior to 3.2.60 contain multiple SQL injection vulnerabilities in the asset list functionality. Multiple request parameters used to filter, search, or sort assets are incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database…
more
queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.
Deeper analysisAI
CVE-2026-22197 is a set of multiple SQL injection vulnerabilities (CWE-89) affecting GestSup versions prior to 3.2.60, specifically in the asset list functionality. Request parameters used for filtering, searching, or sorting assets are directly incorporated into SQL queries without adequate neutralization or sanitization. The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), highlighting its high severity due to network accessibility and low complexity.
An authenticated attacker with low privileges (PR:L) can exploit these SQL injections remotely over the network without user interaction. By manipulating the vulnerable parameters, they can alter SQL queries to achieve unauthorized access to sensitive database contents or modify data, with impacts limited by the attacker's database privileges. Exploitation does not affect availability.
Mitigation guidance from the vendor's changelog at https://gestsup.fr/index.php?page=changelog and the VulnCheck advisory at https://www.vulncheck.com/advisories/gestsup-multiple-sqli-in-asset-list recommends upgrading to GestSup version 3.2.60 or later, where the SQL injection issues in the asset list have been addressed.
Details
- CWE(s)