Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1472: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Quatuor Evaluación de Desempeño (EDD)

0
Critical
VulnerabilityCVE-2026-1472cvecve-2026-1472cwe-89
Published: Tue Jan 27 2026 (01/27/2026, 16:26:46 UTC)
Source: CVE Database V5
Vendor/Project: Quatuor
Product: Evaluación de Desempeño (EDD)

Description

An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter 'txAny' in '/evaluacion_competencias_autoeval_list.aspx', could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information.

AI-Powered Analysis

AILast updated: 01/27/2026, 16:51:47 UTC

Technical Analysis

CVE-2026-1472 identifies a critical SQL injection vulnerability classified under CWE-89 in the Quatuor Evaluación de Desempeño (EDD) application, a performance evaluation tool developed by Gabinete Técnico de Programación. The vulnerability is an out-of-band (OOB) SQL injection located in the 'txAny' parameter of the '/evaluacion_competencias_autoeval_list.aspx' page. Unlike traditional in-band SQLi, OOB SQLi allows attackers to exfiltrate data through external channels such as DNS or HTTP requests initiated by the database server, bypassing direct response filtering by the application. This vulnerability affects all versions of the product and requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 score of 9.3 reflects its critical severity, with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality and integrity. The vulnerability enables attackers to extract sensitive information from the backend database, potentially exposing confidential employee evaluations or organizational data. No patches or exploit code are currently publicly available, but the risk remains significant due to the nature of the flaw and the widespread use of the affected software in performance management contexts.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe confidentiality breaches involving sensitive HR and performance evaluation data, potentially violating GDPR and other data protection regulations. The integrity of evaluation data could also be compromised, undermining trust in performance management processes. The out-of-band nature of the attack complicates detection, increasing the risk of prolonged undetected data exfiltration. Organizations relying on Quatuor EDD for employee assessments or compliance reporting may face reputational damage, legal penalties, and operational disruptions. The vulnerability's ease of exploitation without authentication or user interaction broadens the attack surface, making even perimeter defenses insufficient if internal monitoring is lacking. Additionally, the exposure of sensitive internal data could be leveraged for further attacks such as social engineering or insider threats.

Mitigation Recommendations

Immediate mitigation should focus on implementing strict input validation and sanitization for the 'txAny' parameter to prevent injection of malicious SQL commands. Developers should adopt parameterized queries or prepared statements to eliminate direct concatenation of user input into SQL commands. Network-level controls such as egress filtering should be enforced to block unauthorized outbound connections that could be used for OOB data exfiltration. Organizations should monitor DNS and HTTP traffic for anomalies indicative of OOB SQLi exploitation attempts. Conducting a thorough code review and penetration testing focused on SQL injection vectors is recommended. Since no patches are currently available, consider isolating or restricting access to the affected application until a vendor fix is released. Logging and alerting mechanisms should be enhanced to detect suspicious activities related to database queries and outbound network requests. Finally, ensure that all backups and sensitive data repositories are secured and regularly audited.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-01-27T09:25:46.303Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6978e96c4623b1157c366960

Added to database: 1/27/2026, 4:35:56 PM

Last enriched: 1/27/2026, 4:51:47 PM

Last updated: 2/5/2026, 8:33:01 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats