Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22644: CWE-598 Use of GET Request Method With Sensitive Query Strings in SICK AG Incoming Goods Suite

0
Medium
VulnerabilityCVE-2026-22644cvecve-2026-22644cwe-598
Published: Thu Jan 15 2026 (01/15/2026, 13:14:13 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: Incoming Goods Suite

Description

Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:48:52 UTC

Technical Analysis

CVE-2026-22644 identifies a security weakness in the SICK AG Incoming Goods Suite where authentication tokens are transmitted as query parameters in HTTP GET requests. This method of token transmission violates secure design principles because URLs are commonly logged by web servers, proxies, and can be leaked via the Referer HTTP header when users navigate to other sites. An attacker with access to these logs or network traffic can extract the token and impersonate the legitimate user, gaining unauthorized access to the system. The vulnerability is classified under CWE-598, which concerns the use of GET requests with sensitive query strings. The CVSS 3.1 base score of 5.3 reflects a medium severity, with network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact (token theft). No integrity or availability impacts are noted. The vulnerability affects all versions of the Incoming Goods Suite, indicating a systemic design flaw rather than a version-specific bug. No patches or fixes have been published yet, and no known exploits have been observed in the wild, but the risk remains due to the ease of token interception and session hijacking potential.

Potential Impact

For European organizations, especially those in manufacturing, logistics, and supply chain management using SICK AG's Incoming Goods Suite, this vulnerability poses a risk of unauthorized access to sensitive operational systems. Attackers who obtain authentication tokens can hijack sessions, potentially leading to data exposure or manipulation of incoming goods records. Although the vulnerability does not directly impact system integrity or availability, unauthorized access could facilitate further attacks or data leakage. The exposure of tokens in URLs also increases the risk of insider threats or accidental leaks through shared logs. Given the critical role of supply chain systems in European industry, exploitation could disrupt operations or compromise sensitive business information. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the threat landscape for affected organizations.

Mitigation Recommendations

Organizations should immediately review and modify their use of the Incoming Goods Suite to ensure authentication tokens are never transmitted via URL query parameters. Instead, tokens should be passed securely in HTTP headers or POST request bodies. Network monitoring should be enhanced to detect unusual access patterns or token reuse indicative of session hijacking. Access to server and proxy logs must be tightly controlled and regularly audited to prevent unauthorized access. If possible, implement short-lived tokens and enforce token expiration to limit the window of exploitation. Organizations should also engage with SICK AG to request patches or updated versions that address this design flaw. Additionally, consider deploying web application firewalls (WAFs) to detect and block suspicious requests involving token leakage. User training on secure session handling and awareness of phishing or social engineering attempts can further reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-08T09:59:06.199Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968ec9a4c611209ad10ad19

Added to database: 1/15/2026, 1:33:14 PM

Last enriched: 1/15/2026, 1:48:52 PM

Last updated: 2/6/2026, 8:55:16 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats