Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3021: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in Wakyma Wakyma application web

0
High
VulnerabilityCVE-2026-3021cvecve-2026-3021cwe-943
Published: Mon Mar 16 2026 (03/16/2026, 10:11:11 UTC)
Source: CVE Database V5
Vendor/Project: Wakyma
Product: Wakyma application web

Description

Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web application, specifically in the endpoint 'vets.wakyma.com/centro/equipo/empleado'. This vulnerability could allow an authenticated user to alter a GET request to the affected endpoint for the purpose of injecting special NoSQL commands. This would lead to the enumeration of sensitive employee data.

AI-Powered Analysis

AILast updated: 03/16/2026, 18:23:43 UTC

Technical Analysis

CVE-2026-3021 is a NoSQL injection vulnerability classified under CWE-943, indicating improper neutralization of special elements in data query logic within the Wakyma web application. The vulnerability specifically affects the endpoint vets.wakyma.com/centro/equipo/empleado, where an authenticated user can craft a specially altered GET request to inject NoSQL commands. This injection flaw allows unauthorized enumeration of sensitive employee data stored in the backend NoSQL database. Unlike traditional SQL injection, NoSQLi targets databases like MongoDB or CouchDB that use JSON-like query structures. The root cause is insufficient sanitization or validation of input parameters before incorporating them into NoSQL queries, enabling attackers to manipulate query logic. The vulnerability affects all versions of the Wakyma application, indicating a systemic issue in input handling. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:N/VA:N) highlights that the attack is remotely exploitable over the network, requires low complexity, and only low-level privileges, but no user interaction. The impact is high on confidentiality, as sensitive employee information can be enumerated, but integrity and availability are not affected. No patches or fixes have been published yet, and no public exploits are known, but the vulnerability poses a significant risk if weaponized. Organizations relying on Wakyma should urgently assess exposure and implement compensating controls.

Potential Impact

The primary impact of CVE-2026-3021 is the unauthorized disclosure of sensitive employee data through NoSQL injection attacks. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, HIPAA), and reputational damage. Attackers with low-level authenticated access can escalate their information gathering capabilities, potentially facilitating further attacks such as social engineering or insider threats. Since the vulnerability does not affect integrity or availability, direct system disruption or data manipulation is less likely. However, the confidentiality breach alone can have severe consequences, especially for organizations handling sensitive personnel records. The lack of patches increases the window of exposure, and if exploited in the wild, could lead to widespread data leaks. Organizations in sectors like healthcare, government, finance, and large enterprises with extensive employee databases are particularly at risk. The vulnerability also raises concerns about the security posture of NoSQL-based applications and the need for secure coding practices.

Mitigation Recommendations

To mitigate CVE-2026-3021, organizations should implement strict input validation and sanitization on all parameters accepted by the vulnerable endpoint, ensuring that special NoSQL operators or commands cannot be injected. Employ parameterized queries or prepared statements specific to the NoSQL database in use to separate code from data. Enforce the principle of least privilege by restricting user permissions to only necessary data access, minimizing the impact of compromised credentials. Monitor and log access to the affected endpoint for anomalous query patterns indicative of injection attempts. Conduct thorough code reviews and security testing focused on NoSQL injection vectors. Until an official patch is released, consider deploying a Web Application Firewall (WAF) with custom rules to detect and block NoSQL injection payloads targeting the endpoint. Educate developers on secure NoSQL coding practices and the risks of improper input handling. Finally, maintain an incident response plan to quickly address any detected exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-02-23T13:43:54.643Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b84a03771bdb1749186ace

Added to database: 3/16/2026, 6:20:51 PM

Last enriched: 3/16/2026, 6:23:43 PM

Last updated: 3/19/2026, 7:08:27 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses