CVE-2026-22195
BaseFortify
Publication date: 2026-01-09
Last updated on: 2026-01-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gestsup | gestsup | to 3.2.56 (inc) |
| gestsup | gestsup | From 3.2.45 (inc) |
| fontawesome | fontawesome | From 5.9.0 (inc) to 7.0.1 (inc) |
| highcharts | highcharts | From 11.2.0 (inc) to 12.4.0 (inc) |
| phpmailer | phpmailer | From 6.9.1 (inc) to 6.10.0 (inc) |
| microsoft | graph | From 1.109.2 (inc) to 1.110.0 (inc) |
| fullcalendar | fullcalendar | From 6.1.10 (inc) to 6.1.17 (inc) |
| htmlpurifier | htmlpurifier | to 4.17.0 (inc) |
| swagger-ui | swagger-ui | to 5.11.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-22195 is a SQL injection vulnerability in GestSup versions up to 3.2.56, specifically in the search bar functionality. It occurs because user input in the search bar is directly included in SQL queries without proper neutralization, allowing an authenticated attacker to manipulate these queries. This can lead to unauthorized access or modification of the database depending on the attacker's privileges. [2]
How can this vulnerability impact me? :
This vulnerability can allow an authenticated attacker to manipulate database queries, potentially resulting in unauthorized access to or modification of sensitive database contents. The impact depends on the database privileges of the attacker, but it can compromise confidentiality, integrity, and availability of the data managed by GestSup. [2]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately upgrade GestSup to a version later than 3.2.56 where the SQL injection vulnerability in the search bar has been fixed. Additionally, ensure that only authenticated users with appropriate privileges can access the search functionality, and monitor for any unusual database query activity. Applying security updates and patches provided by GestSup is critical to prevent exploitation. [2]