INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2026-22194

High
GestSup CSRF Vulnerability Enables Unauthorized Privileged Account Creation (CVE-2026-22194)
CWE-352 — Weakness Type
Published: Jan 9, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

GestSup versions up to and including 3.2.60 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.

🤖 AI Executive Summary

GestSup versions up to 3.2.60 contain a critical CSRF vulnerability (CWE-352) that allows attackers to forge requests on behalf of authenticated administrators. Attackers can exploit this flaw to create privileged accounts by tricking administrators into clicking malicious links, potentially leading to complete system compromise.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية على نظام GestSup للإدارة حيث يفشل التطبيق في التحقق من صحة الطلبات الواردة من العملاء المصادق عليهم. يستطيع المهاجم صياغة طلبات HTTP خبيثة وإرسالها للمستخدمين الإداريين المسجلين في النظام، مما يؤدي إلى تنفيذ عمليات غير مصرح بها باستخدام صلاحيات الضحية. الهدف الرئيسي للاستغلال هو نقطة إنشاء المستخدمين الإدارية، حيث يمكن للمهاجم إنشاء حسابات ذات صلاحيات إدارية كاملة دون علم المسؤول الشرعي. تصنف هذه الثغرة بدرجة خطورة عالية 8.8 على مقياس CVSS ولا يتوفر حالياً أي تصحيح أمني رسمي من المطور.

🤖 ملخص تنفيذي (AI)

تحتوي إصدارات نظام GestSup حتى 3.2.60 على ثغرة أمنية خطيرة من نوع CSRF تسمح للمهاجمين بتزوير طلبات نيابة عن المسؤولين المصادق عليهم. يمكن للمهاجمين استغلال هذه الثغرة لإنشاء حسابات ذات صلاحيات عالية عبر خداع المسؤولين للنقر على روابط ضارة، مما قد يؤدي إلى اختراق كامل للنظام.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 08:08
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using GestSup for IT service management face significant risk of unauthorized administrative access and privilege escalation. This vulnerability could enable attackers to establish persistent backdoor accounts, compromising sensitive government and financial data managed through the platform, particularly affecting entities under NCA and SAMA oversight.
🏢 Affected Saudi Sectors
القطاع الحكومي القطاع المالي والمصرفي قطاع الاتصالات وتقنية المعلومات قطاع الخدمات المشتركة قطاع التعليم
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately implement anti-CSRF tokens for all state-changing operations, particularly administrative functions like user creation, using cryptographically secure random values validated server-side
2. Deploy additional authentication measures for sensitive operations including re-authentication prompts, CAPTCHA verification, and same-site cookie attributes (SameSite=Strict) to prevent cross-origin request execution
3. Establish network-level controls to restrict administrative interface access to trusted IP ranges, implement Web Application Firewall (WAF) rules to detect CSRF patterns, and conduct immediate security audit of all recently created administrative accounts
🔧 خطوات المعالجة (العربية)
1. تطبيق رموز مضادة لهجمات CSRF فوراً لجميع العمليات التي تغير حالة النظام، خاصة الوظائف الإدارية مثل إنشاء المستخدمين، باستخدام قيم عشوائية آمنة مشفرة يتم التحقق منها من جانب الخادم
2. نشر إجراءات مصادقة إضافية للعمليات الحساسة تشمل طلبات إعادة المصادقة، والتحقق عبر CAPTCHA، وتعيين خصائص ملفات تعريف الارتباط (SameSite=Strict) لمنع تنفيذ الطلبات عبر النطاقات المختلفة
3. إنشاء ضوابط على مستوى الشبكة لتقييد الوصول إلى الواجهة الإدارية من نطاقات IP موثوقة، وتطبيق قواعد جدار حماية تطبيقات الويب (WAF) لاكتشاف أنماط CSRF، وإجراء مراجعة أمنية فورية لجميع الحسابات الإدارية المنشأة مؤخراً
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 ECC-2-1 ECC-3-1 ECC-4-1
🔵 SAMA CSF
CCC-1.1.1 CCC-2.1.1 CCC-3.1.1 CCC-5.1.1
🟡 ISO 27001:2022
A.9.4.2 A.14.2.5 A.18.1.3
📦 Affected Products / CPE 1 entries
gestsup:gestsup
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionR — Required
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-352
EPSS0.01%
Exploit No
Patch ✓ Yes
Published 2026-01-09
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-352
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.