CVE-2026-1472: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Quatuor Evaluación de Desempeño (EDD)
An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter 'txAny' in '/evaluacion_competencias_autoeval_list.aspx', could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information.
AI Analysis
Technical Summary
CVE-2026-1472 identifies a critical SQL injection vulnerability classified under CWE-89 in the Quatuor Evaluación de Desempeño (EDD) application, a performance evaluation tool developed by Gabinete Técnico de Programación. The vulnerability is an out-of-band (OOB) SQL injection located in the 'txAny' parameter of the '/evaluacion_competencias_autoeval_list.aspx' page. Unlike traditional in-band SQLi, OOB SQLi allows attackers to exfiltrate data through external channels such as DNS or HTTP requests initiated by the database server, bypassing direct response filtering by the application. This vulnerability affects all versions of the product and requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 score of 9.3 reflects its critical severity, with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and integrity. The vulnerability enables attackers to extract sensitive information from the backend database, potentially exposing confidential employee evaluations or organizational data. No patches or exploit code are currently publicly available, but the risk remains significant due to the nature of the flaw and the widespread use of the affected software in performance management contexts.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to severe confidentiality breaches involving sensitive HR and performance evaluation data, potentially violating GDPR and other data protection regulations. The integrity of evaluation data could also be compromised, undermining trust in performance management processes. The out-of-band nature of the attack complicates detection, increasing the risk of prolonged undetected data exfiltration. Organizations relying on Quatuor EDD for employee assessments or compliance reporting may face reputational damage, legal penalties, and operational disruptions. The vulnerability's ease of exploitation without authentication or user interaction broadens the attack surface, making even perimeter defenses insufficient if internal monitoring is lacking. Additionally, the exposure of sensitive internal data could be leveraged for further attacks such as social engineering or insider threats.
Mitigation Recommendations
Immediate mitigation should focus on implementing strict input validation and sanitization for the 'txAny' parameter to prevent injection of malicious SQL commands. Developers should adopt parameterized queries or prepared statements to eliminate direct concatenation of user input into SQL commands. Network-level controls such as egress filtering should be enforced to block unauthorized outbound connections that could be used for OOB data exfiltration. Organizations should monitor DNS and HTTP traffic for anomalies indicative of OOB SQLi exploitation attempts. Conducting a thorough code review and penetration testing focused on SQL injection vectors is recommended. Since no patches are currently available, consider isolating or restricting access to the affected application until a vendor fix is released. Logging and alerting mechanisms should be enhanced to detect suspicious activities related to database queries and outbound network requests. Finally, ensure that all backups and sensitive data repositories are secured and regularly audited.
Affected Countries
Spain, Germany, France, Italy, Netherlands
CVE-2026-1472: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Quatuor Evaluación de Desempeño (EDD)
Description
An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter 'txAny' in '/evaluacion_competencias_autoeval_list.aspx', could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information.
AI-Powered Analysis
Technical Analysis
CVE-2026-1472 identifies a critical SQL injection vulnerability classified under CWE-89 in the Quatuor Evaluación de Desempeño (EDD) application, a performance evaluation tool developed by Gabinete Técnico de Programación. The vulnerability is an out-of-band (OOB) SQL injection located in the 'txAny' parameter of the '/evaluacion_competencias_autoeval_list.aspx' page. Unlike traditional in-band SQLi, OOB SQLi allows attackers to exfiltrate data through external channels such as DNS or HTTP requests initiated by the database server, bypassing direct response filtering by the application. This vulnerability affects all versions of the product and requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 score of 9.3 reflects its critical severity, with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and integrity. The vulnerability enables attackers to extract sensitive information from the backend database, potentially exposing confidential employee evaluations or organizational data. No patches or exploit code are currently publicly available, but the risk remains significant due to the nature of the flaw and the widespread use of the affected software in performance management contexts.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to severe confidentiality breaches involving sensitive HR and performance evaluation data, potentially violating GDPR and other data protection regulations. The integrity of evaluation data could also be compromised, undermining trust in performance management processes. The out-of-band nature of the attack complicates detection, increasing the risk of prolonged undetected data exfiltration. Organizations relying on Quatuor EDD for employee assessments or compliance reporting may face reputational damage, legal penalties, and operational disruptions. The vulnerability's ease of exploitation without authentication or user interaction broadens the attack surface, making even perimeter defenses insufficient if internal monitoring is lacking. Additionally, the exposure of sensitive internal data could be leveraged for further attacks such as social engineering or insider threats.
Mitigation Recommendations
Immediate mitigation should focus on implementing strict input validation and sanitization for the 'txAny' parameter to prevent injection of malicious SQL commands. Developers should adopt parameterized queries or prepared statements to eliminate direct concatenation of user input into SQL commands. Network-level controls such as egress filtering should be enforced to block unauthorized outbound connections that could be used for OOB data exfiltration. Organizations should monitor DNS and HTTP traffic for anomalies indicative of OOB SQLi exploitation attempts. Conducting a thorough code review and penetration testing focused on SQL injection vectors is recommended. Since no patches are currently available, consider isolating or restricting access to the affected application until a vendor fix is released. Logging and alerting mechanisms should be enhanced to detect suspicious activities related to database queries and outbound network requests. Finally, ensure that all backups and sensitive data repositories are secured and regularly audited.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2026-01-27T09:25:46.303Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6978e96c4623b1157c366960
Added to database: 1/27/2026, 4:35:56 PM
Last enriched: 1/27/2026, 4:51:47 PM
Last updated: 2/5/2026, 8:33:01 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25575: CWE-23: Relative Path Traversal in TUM-Dev NavigaTUM
HighCVE-2025-10258: Vulnerability in Nokia Infinera DNA
UnknownCVE-2026-1268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds Dynamic Widget Content
MediumCVE-2026-1246: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
MediumCVE-2026-0867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in catchthemes Essential Widgets
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.