INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2026-22196

High
SQL Injection Vulnerability in GestSup Ticket Creation (CVE-2026-22196)
CWE-89 — Weakness Type
Published: Jan 9, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.1
🔗 NVD Official
📄 Description (English)

GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in ticket creation functionality. User-controlled input provided during ticket creation is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

🤖 AI Executive Summary

GestSup versions prior to 3.2.60 contain a critical SQL injection vulnerability in the ticket creation functionality that allows authenticated attackers to manipulate database queries. Attackers can exploit insufficient input validation to gain unauthorized access to sensitive database contents or modify critical data. Organizations using affected versions face risks of data breaches and database integrity compromise.

📄 Description (Arabic)

تعاني إصدارات GestSup السابقة للإصدار 3.2.60 من ثغرة حقن SQL في آلية إنشاء التذاكر حيث يتم دمج المدخلات التي يتحكم فيها المستخدم مباشرة في استعلامات SQL دون تعقيم كافٍ. يمكن للمهاجم المصادق عليه استغلال هذه الثغرة لتنفيذ استعلامات SQL خبيثة تمكنه من قراءة أو تعديل أو حذف بيانات حساسة في قاعدة البيانات. تعتمد خطورة الاستغلال على صلاحيات قاعدة البيانات المتاحة للتطبيق وقد تؤدي إلى تسريب معلومات العملاء أو البيانات المالية أو تعطيل الخدمات الحيوية. تصنف هذه الثغرة بدرجة خطورة عالية (8.1) وتتطلب معالجة فورية.

🤖 ملخص تنفيذي (AI)

تحتوي إصدارات GestSup الأقدم من 3.2.60 على ثغرة حقن SQL حرجة في وظيفة إنشاء التذاكر تسمح للمهاجمين المصادق عليهم بالتلاعب باستعلامات قاعدة البيانات. يمكن للمهاجمين استغلال ضعف التحقق من المدخلات للحصول على وصول غير مصرح به لمحتويات قاعدة البيانات الحساسة أو تعديل البيانات الحرجة. تواجه المؤسسات التي تستخدم الإصدارات المتأثرة مخاطر اختراق البيانات والإضرار بسلامة قاعدة البيانات.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 08:09
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using GestSup for IT service management and ticketing systems face significant risks of unauthorized database access and data manipulation. This vulnerability is particularly concerning for entities in financial services, healthcare, and government sectors that handle sensitive customer data and must comply with PDPL, NCA ECC, and SAMA CSF requirements for data protection and access control.
🏢 Affected Saudi Sectors
الخدمات المالية والمصرفية الرعاية الصحية القطاع الحكومي الاتصالات وتقنية المعلومات التعليم الخدمات المهنية
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately upgrade GestSup to version 3.2.60 or later, or implement input validation and parameterized queries as a temporary mitigation if patching is not immediately possible
2. Conduct a comprehensive security audit of all database access logs to identify potential exploitation attempts and assess the scope of any unauthorized access or data modification
3. Implement database activity monitoring, restrict database user privileges to minimum required permissions, and enforce multi-factor authentication for all administrative accounts accessing the ticketing system
🔧 خطوات المعالجة (العربية)
1. الترقية الفورية لنظام GestSup إلى الإصدار 3.2.60 أو أحدث، أو تطبيق التحقق من صحة المدخلات واستخدام الاستعلامات المعلمية كحل مؤقت إذا لم يكن التحديث ممكناً فوراً
2. إجراء مراجعة أمنية شاملة لجميع سجلات الوصول إلى قاعدة البيانات لتحديد محاولات الاستغلال المحتملة وتقييم نطاق أي وصول غير مصرح به أو تعديل للبيانات
3. تطبيق مراقبة نشاط قاعدة البيانات، وتقييد صلاحيات مستخدمي قاعدة البيانات إلى الحد الأدنى المطلوب، وفرض المصادقة متعددة العوامل لجميع الحسابات الإدارية التي تصل إلى نظام التذاكر
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-1 ECC-1-2 ECC-2-1 ECC-3-1 ECC-5-1 ECC-5-2
🔵 SAMA CSF
CCC-1.1 CCC-2.1 CCC-3.1 CCC-4.1 DAR-1.1 TVM-1.1 TVM-2.1
🟡 ISO 27001:2022
A.8.2 A.8.3 A.12.6.1 A.14.2.1 A.18.1.3
📦 Affected Products / CPE 1 entries
gestsup:gestsup
📊 CVSS Score
8.1
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityN — None / Network
📋 Quick Facts
Severity High
CVSS Score8.1
CWECWE-89
EPSS0.02%
Exploit No
Patch ✓ Yes
Published 2026-01-09
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-89
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.