Gestsup

5 CVEs product

Monthly

CVE-2026-22198 MEDIUM This Month

GestSup before version 3.2.60 contains a pre-authentication stored XSS vulnerability in API error logging that allows unauthenticated attackers to inject malicious scripts into log files via crafted API requests. When administrators view these logs in the web interface, the injected scripts execute in their browser with administrative privileges due to insufficient output encoding. This impacts both GestSup and PHP-based installations, enabling attackers to compromise administrator accounts without prior authentication.

PHP XSS Gestsup
NVD
CVSS 3.1
6.1
EPSS
0.1%
CVE-2026-22197 HIGH This Week

GestSup versions before 3.2.60 allow authenticated attackers to execute SQL injection attacks through insufficiently sanitized filtering and sorting parameters in the asset list functionality, potentially enabling unauthorized database access or modification. The vulnerability requires valid credentials to exploit but has no available patch, leaving affected installations vulnerable to data breach or manipulation depending on database permissions.

SQLi Gestsup
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-22196 HIGH This Week

GestSup prior to version 3.2.60 is vulnerable to SQL injection in the ticket creation feature, allowing authenticated attackers to execute arbitrary database queries through unsanitized user input. An attacker with valid credentials can read or modify sensitive database contents depending on the database permission level. No patch is currently available.

SQLi Gestsup
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-22195 HIGH This Week

Authenticated attackers can exploit SQL injection in GestSup's search functionality (versions before 3.2.60) to manipulate database queries and access or modify sensitive data. The vulnerability stems from insufficient input validation on user-controlled search parameters in SQL statements. With no patch currently available, affected organizations should implement database access controls and monitor for suspicious search activity.

SQLi Gestsup
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-22194 HIGH This Week

GestSup through version 3.2.60 fails to implement CSRF protections, enabling attackers to forge requests that execute actions with a victim's privileges when they visit a malicious site. An unauthenticated attacker can exploit this to create privileged administrative accounts by targeting logged-in users, with no patch currently available to remediate the vulnerability.

CSRF Gestsup
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-22198
EPSS 0% CVSS 6.1
MEDIUM This Month

GestSup before version 3.2.60 contains a pre-authentication stored XSS vulnerability in API error logging that allows unauthenticated attackers to inject malicious scripts into log files via crafted API requests. When administrators view these logs in the web interface, the injected scripts execute in their browser with administrative privileges due to insufficient output encoding. This impacts both GestSup and PHP-based installations, enabling attackers to compromise administrator accounts without prior authentication.

PHP XSS Gestsup
NVD
CVE-2026-22197
EPSS 0% CVSS 8.1
HIGH This Week

GestSup versions before 3.2.60 allow authenticated attackers to execute SQL injection attacks through insufficiently sanitized filtering and sorting parameters in the asset list functionality, potentially enabling unauthorized database access or modification. The vulnerability requires valid credentials to exploit but has no available patch, leaving affected installations vulnerable to data breach or manipulation depending on database permissions.

SQLi Gestsup
NVD
CVE-2026-22196
EPSS 0% CVSS 8.1
HIGH This Week

GestSup prior to version 3.2.60 is vulnerable to SQL injection in the ticket creation feature, allowing authenticated attackers to execute arbitrary database queries through unsanitized user input. An attacker with valid credentials can read or modify sensitive database contents depending on the database permission level. No patch is currently available.

SQLi Gestsup
NVD
CVE-2026-22195
EPSS 0% CVSS 8.1
HIGH This Week

Authenticated attackers can exploit SQL injection in GestSup's search functionality (versions before 3.2.60) to manipulate database queries and access or modify sensitive data. The vulnerability stems from insufficient input validation on user-controlled search parameters in SQL statements. With no patch currently available, affected organizations should implement database access controls and monitor for suspicious search activity.

SQLi Gestsup
NVD
CVE-2026-22194
EPSS 0% CVSS 8.8
HIGH This Week

GestSup through version 3.2.60 fails to implement CSRF protections, enabling attackers to forge requests that execute actions with a victim's privileges when they visit a malicious site. An unauthenticated attacker can exploit this to create privileged administrative accounts by targeting logged-in users, with no patch currently available to remediate the vulnerability.

CSRF Gestsup
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy