Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1479: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Quatuor Evaluación de Desempeño (EDD)

0
Critical
VulnerabilityCVE-2026-1479cvecve-2026-1479cwe-89
Published: Tue Jan 27 2026 (01/27/2026, 16:31:06 UTC)
Source: CVE Database V5
Vendor/Project: Quatuor
Product: Evaluación de Desempeño (EDD)

Description

An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameters 'Id_usuario' and 'Id_evaluacion’ in ‘/evaluacion_hca_ver_auto.asp', could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information.

AI-Powered Analysis

AILast updated: 01/27/2026, 17:06:32 UTC

Technical Analysis

CVE-2026-1479 identifies a critical out-of-band SQL injection (OOB SQLi) vulnerability in the Quatuor Evaluación de Desempeño (EDD) application, developed by Gabinete Técnico de Programación. This vulnerability exists in the handling of the 'Id_usuario' and 'Id_evaluacion' parameters within the '/evaluacion_hca_ver_auto.asp' endpoint. An attacker can craft malicious input that is improperly neutralized, allowing them to inject SQL commands that are executed by the backend database. Unlike typical in-band SQLi, this OOB SQLi enables attackers to extract sensitive information through external communication channels, such as DNS or HTTP requests initiated by the database server, bypassing direct response filtering by the application. The vulnerability affects all versions of the product, indicating a systemic flaw in input validation and query construction. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N) highlights that the attack can be performed remotely over the network without any authentication or user interaction, with high impact on confidentiality and integrity, and low impact on availability. Although no exploits have been reported in the wild yet, the critical nature and ease of exploitation make this a significant threat. The vulnerability stems from CWE-89, which concerns improper neutralization of special elements in SQL commands, a common and dangerous injection flaw. The lack of patches at the time of publication necessitates immediate defensive measures. Organizations using Quatuor EDD, particularly those managing sensitive employee performance data, are at risk of data leakage, potentially exposing personal and organizational information. The out-of-band nature complicates detection, as the application does not directly return the extracted data, requiring defenders to monitor indirect indicators such as unusual outbound traffic or database logs.

Potential Impact

For European organizations, the impact of CVE-2026-1479 is substantial. The EDD application is used for performance evaluations, which typically contain sensitive personal and professional data. Exploitation could lead to unauthorized disclosure of employee information, internal evaluations, and potentially other linked confidential data stored in the database. This breach of confidentiality could result in regulatory non-compliance, especially under GDPR, leading to legal penalties and reputational damage. The integrity of evaluation data could also be compromised, undermining trust in HR processes. Since the vulnerability requires no authentication or user interaction, attackers can remotely exploit it at scale, increasing the risk of widespread data breaches. The out-of-band extraction method makes detection difficult, potentially allowing prolonged undetected data exfiltration. European public sector entities and private companies relying on Quatuor EDD for HR management are particularly vulnerable, as they often handle large volumes of sensitive personal data. The critical severity score reflects the high potential for damage, emphasizing the need for urgent attention to prevent exploitation and data loss.

Mitigation Recommendations

To mitigate CVE-2026-1479 effectively, organizations should implement the following specific measures: 1) Immediately audit all inputs to the '/evaluacion_hca_ver_auto.asp' endpoint, focusing on 'Id_usuario' and 'Id_evaluacion' parameters, ensuring strict input validation and sanitization to reject malicious payloads. 2) Refactor database interaction code to use parameterized queries or prepared statements, eliminating direct concatenation of user inputs into SQL commands. 3) Implement Web Application Firewall (WAF) rules tailored to detect and block SQL injection patterns, including out-of-band injection attempts. 4) Monitor network traffic for unusual outbound connections from the database server, such as DNS or HTTP requests that could indicate OOB data exfiltration. 5) Conduct thorough logging and anomaly detection on database query patterns to identify suspicious activity. 6) Engage with the vendor for patches or updates; if unavailable, consider temporary compensating controls such as restricting access to the vulnerable endpoint or isolating the database server from unnecessary network exposure. 7) Educate development and security teams on secure coding practices to prevent injection flaws in future releases. 8) Perform regular security assessments and penetration testing focused on injection vulnerabilities. These targeted actions go beyond generic advice by addressing the specific attack vectors and detection challenges posed by out-of-band SQL injection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-01-27T09:25:56.039Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6978ecf04623b1157c3739e1

Added to database: 1/27/2026, 4:50:56 PM

Last enriched: 1/27/2026, 5:06:32 PM

Last updated: 2/8/2026, 2:07:01 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats