Description
GestSup versions up to and including 3.2.60 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.
Published: 2026-01-09
Score: 8.9 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via CSRF
Action: Apply Patch
AI Analysis

Impact

The flaw is a cross‑site request forgery that allows an attacker to cause a logged‑in user to submit requests that the application will execute with the victim’s privileges. This can be leveraged against the administrative account creation endpoint to create new privileged accounts without the need for valid credentials. The result is an elevation of privilege that grants the attacker full control over the application and its data.

Affected Systems

GestSup deployments of versions 3.2.60 and earlier are affected. The issue is present in all copies of the software up to and including 3.2.60, regardless of the hosting environment, as the vendor’s change log indicates the vulnerability persists through that release.

Risk and Exploitability

The vulnerability has a CVSS score of 8.9, classifying it as high severity. The likelihood of exploitation is very low, recorded below 1% for exploit probability, and there are no current reports of exploitation in the Known Exploited Vulnerabilities catalog. The attack requires a user with an authenticated session and a method to persuade that user to submit a crafted request, such as a malicious link or embedded form. No additional credentials or system access are needed beyond the victim’s authenticated session.

Generated by OpenCVE AI on April 18, 2026 at 16:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GestSup to a release newer than 3.2.60, preferably the latest available version, to eliminate the CSRF flaw.
  • If an upgrade is not immediately possible, implement protection by adding a CSRF token to the administrative account creation endpoint and validating it on the server side.
  • Restrict access to the administrative account creation endpoint to trusted IP addresses or authenticated administrators only, reducing the attack surface.

Generated by OpenCVE AI on April 18, 2026 at 16:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gestsup:gestsup:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Wed, 14 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description GestSup versions up to and including 3.2.56 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint. GestSup versions up to and including 3.2.60 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.

Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Gestsup
Gestsup gestsup
Vendors & Products Gestsup
Gestsup gestsup

Fri, 09 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description GestSup versions up to and including 3.2.56 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.
Title GestSup <= 3.2.56 CSRF Allows Privileged Actions
Weaknesses CWE-352
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:30:12.545Z

Reserved: 2026-01-06T16:47:17.184Z

Link: CVE-2026-22194

cve-icon Vulnrichment

Updated: 2026-01-09T17:48:20.475Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-09T17:15:54.750

Modified: 2026-01-14T19:22:40.133

Link: CVE-2026-22194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:45:05Z

Weaknesses