No advisories yet.
Solution
The vulnerability has been fixed by the T-Systems team in version 2505.0.13. It is recommended to update the system software to this version or, failing that, to the latest stable version.
Workaround
No workaround given by the vendor.
Tue, 03 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection vulnerability in the Buroweb platform version 2505.0.12, specifically in the 'tablon' component. This vulnerability is present in several parameters that do not correctly sanitize user input in the endpoint '/sta/CarpetaPublic/doEvent?APP_CODE=STA&PAGE_CODE=TABLON'. Exploiting this vulnerability could allow an attacker to execute queries on the database and gain access to confidential information. | |
| Title | SQL injection (SQLi) on the Buroweb platform | |
| First Time appeared |
T-systems
T-systems buroweb |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:t-systems:buroweb:*:*:*:*:*:*:*:* | |
| Vendors & Products |
T-systems
T-systems buroweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-03T15:28:52.317Z
Reserved: 2026-01-26T12:24:50.541Z
Link: CVE-2026-1432
Updated: 2026-02-03T15:28:44.904Z
Status : Awaiting Analysis
Published: 2026-02-03T12:16:11.777
Modified: 2026-02-03T16:44:03.343
Link: CVE-2026-1432
No data.
OpenCVE Enrichment
No data.