An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario' in ‘/evaluacion_acciones_evalua.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
The vulnerabilities have been resolved in the latest version of the application, released on November 12, 2025, and are no longer exploitable.
Workaround
No workaround given by the vendor.
References
History
Tue, 27 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario' in ‘/evaluacion_acciones_evalua.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | |
| Title | Out-of-band SQL injection in Quatuor Performance Evaluation | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-01-27T16:28:31.574Z
Reserved: 2026-01-27T09:25:52.801Z
Link: CVE-2026-1475
No data.
Status : Received
Published: 2026-01-27T17:16:10.840
Modified: 2026-01-27T17:16:10.840
Link: CVE-2026-1475
No data.
OpenCVE Enrichment
No data.
Weaknesses