GestSup versions prior to 3.2.60 contain a pre-authentication stored cross-site scripting (XSS) vulnerability in the API error logging functionality. By sending an API request with a crafted X-API-KEY header value (for example, to /api/v1/ticket.php), an unauthenticated attacker can cause attacker-controlled HTML/JavaScript to be written to log entries. When an administrator later views the affected logs in the web interface, the injected content is rendered without proper output encoding, resulting in arbitrary script execution in the administrator’s browser session.
References
| Link | Resource |
|---|---|
| https://gestsup.fr/index.php?page=changelog | Release Notes |
| https://www.vulncheck.com/advisories/gestsup-stored-xss-in-api-error-logs | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-09 17:15
Updated : 2026-01-14 19:43
NVD link : CVE-2026-22198
Mitre link : CVE-2026-22198
CVE.ORG link : CVE-2026-22198
JSON object : View
Products Affected
gestsup
- gestsup
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
