Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1476: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Quatuor Evaluación de Desempeño (EDD)

0
Critical
VulnerabilityCVE-2026-1476cvecve-2026-1476cwe-89
Published: Tue Jan 27 2026 (01/27/2026, 16:29:18 UTC)
Source: CVE Database V5
Vendor/Project: Quatuor
Product: Evaluación de Desempeño (EDD)

Description

An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter 'Id_usuario' in ‘/evaluacion_acciones_ver_auto.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information.

AI-Powered Analysis

AILast updated: 01/27/2026, 16:50:40 UTC

Technical Analysis

CVE-2026-1476 identifies a critical SQL injection vulnerability classified under CWE-89 in the Quatuor Evaluación de Desempeño (EDD) application, a performance evaluation software developed by Gabinete Técnico de Programación. The vulnerability is an out-of-band (OOB) SQL injection, which means that the attacker can exploit the 'Id_usuario' parameter in the '/evaluacion_acciones_ver_auto.aspx' endpoint to execute arbitrary SQL commands that do not return data directly through the application’s normal response channels. Instead, the attacker leverages external communication channels to extract sensitive information from the backend database, bypassing typical detection methods. This form of injection is particularly dangerous because it can evade traditional input/output monitoring and logging. The vulnerability affects all versions of the product, indicating a systemic flaw in input handling. The CVSS 4.0 score of 9.3 reflects the vulnerability’s high impact and ease of exploitation: it requires no privileges, no user interaction, and can be exploited remotely over the network. The vulnerability compromises confidentiality primarily, with high impact on integrity and low impact on availability. No patches are currently available, and no known exploits have been reported in the wild, but the risk remains significant due to the critical nature of the flaw and the sensitive data typically handled by performance evaluation systems.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to unauthorized disclosure of sensitive employee or organizational data stored within the EDD application’s database. This can result in severe confidentiality breaches, potentially exposing personal data protected under GDPR, leading to legal and financial penalties. The integrity of performance evaluation data could also be compromised, undermining trust in HR processes and decision-making. Since the vulnerability allows remote exploitation without authentication, attackers could operate from outside the network perimeter, increasing the risk of widespread attacks. Public sector entities and large enterprises using Quatuor’s EDD system are particularly at risk, as they often hold extensive personal and operational data. The lack of direct data return in the attack vector complicates detection and forensic analysis, potentially allowing prolonged undetected data exfiltration. This could also facilitate further attacks by revealing database schema or credentials. Overall, the impact includes data breaches, reputational damage, regulatory fines, and operational disruption.

Mitigation Recommendations

Organizations should immediately implement strict input validation and sanitization on the 'Id_usuario' parameter and any other user-supplied inputs within the EDD application. Employing parameterized queries or prepared statements is essential to prevent injection attacks. Network-level monitoring should be enhanced to detect unusual outbound traffic patterns indicative of OOB SQL injection exploitation. Deploy Web Application Firewalls (WAFs) with updated rules to block suspicious SQL payloads targeting the vulnerable endpoint. Since no official patches are available, consider isolating the application from direct internet exposure and restricting access to trusted internal networks only. Conduct thorough code reviews and security testing to identify and remediate similar injection points. Maintain comprehensive logging and alerting to detect anomalous activities. Engage with the vendor for timely patch releases and apply updates as soon as they become available. Additionally, perform regular security awareness training for developers and administrators on secure coding practices and vulnerability management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-01-27T09:25:53.534Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6978e96c4623b1157c36696c

Added to database: 1/27/2026, 4:35:56 PM

Last enriched: 1/27/2026, 4:50:40 PM

Last updated: 2/7/2026, 10:52:18 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats