gestsup CVE Vulnerabilities & Metrics

Focus on gestsup vulnerabilities and metrics.

Last updated: 16 Jan 2026, 23:25 UTC

About gestsup Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with gestsup. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total gestsup CVEs: 8
Earliest CVE date: 26 Apr 2021, 19:15 UTC
Latest CVE date: 09 Jan 2026, 17:15 UTC

Latest CVE reference: CVE-2026-22198

Rolling Stats

30-day Count (Rolling): 5
365-day Count (Rolling): 5

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 150.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 150.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical gestsup CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.94

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 7
4.0-6.9 0
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS gestsup CVEs

These are the five CVEs with the highest CVSS scores for gestsup, sorted by severity first and recency.

All CVEs for gestsup

CVE-2026-22198 gestsup vulnerability CVSS: 0 09 Jan 2026, 17:15 UTC

GestSup versions prior to 3.2.60 contain a pre-authentication stored cross-site scripting (XSS) vulnerability in the API error logging functionality. By sending an API request with a crafted X-API-KEY header value (for example, to /api/v1/ticket.php), an unauthenticated attacker can cause attacker-controlled HTML/JavaScript to be written to log entries. When an administrator later views the affected logs in the web interface, the injected content is rendered without proper output encoding, resulting in arbitrary script execution in the administrator’s browser session.

CVE-2026-22197 gestsup vulnerability CVSS: 0 09 Jan 2026, 17:15 UTC

GestSup versions prior to 3.2.60 contain multiple SQL injection vulnerabilities in the asset list functionality. Multiple request parameters used to filter, search, or sort assets are incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

CVE-2026-22196 gestsup vulnerability CVSS: 0 09 Jan 2026, 17:15 UTC

GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in ticket creation functionality. User-controlled input provided during ticket creation is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

CVE-2026-22195 gestsup vulnerability CVSS: 0 09 Jan 2026, 17:15 UTC

GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in the search bar functionality. User-controlled search input is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

CVE-2026-22194 gestsup vulnerability CVSS: 0 09 Jan 2026, 17:15 UTC

GestSup versions up to and including 3.2.60 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.

CVE-2023-52060 gestsup vulnerability CVSS: 0 13 Feb 2024, 01:15 UTC

A Cross-Site Request Forgery (CSRF) in Gestsup v3.2.46 allows attackers to arbitrarily edit user profile information via a crafted request.

CVE-2023-52059 gestsup vulnerability CVSS: 0 13 Feb 2024, 01:15 UTC

A cross-site scripting (XSS) vulnerability in Gestsup v3.2.46 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field.

CVE-2021-31646 gestsup vulnerability CVSS: 7.5 26 Apr 2021, 19:15 UTC

Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack.