Description
SQL injection vulnerability in the Buroweb platform version 2505.0.12, specifically in the 'tablon' component. This vulnerability is present in several parameters that do not correctly sanitize user input in the endpoint '/sta/CarpetaPublic/doEvent?APP_CODE=STA&PAGE_CODE=TABLON'. Exploiting this vulnerability could allow an attacker to execute queries on the database and gain access to confidential information.
Published: 2026-02-03
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Database Access via Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The Buroweb platform version 2505.0.12 contains a SQL injection flaw in the ‘tablon’ component. Unsanitized parameters in the endpoint /sta/CarpetaPublic/doEvent?APP_CODE=STA&PAGE_CODE=TABLON allow an attacker to embed arbitrary SQL statements. Exploiting this vulnerability could allow an adversary to execute queries on the database and gain access to confidential information.

Affected Systems

The affected product is T‑Systems Buroweb, specifically the 2505.0.12 release. It has been fixed in 2505.0.13 and any later stable release according to the vendor’s advisory.

Risk and Exploitability

The CVSS score of 9.3 classifies the vulnerability as Critical. However, the EPSS score is listed as < 1 %, indicating that exploitation attempts are currently rare at the industry level. The vulnerability is not included in CISA’s KEV catalog, suggesting no known widespread exploitation yet. Based on the description, the likely attack vector is remote HTTP requests to the vulnerable endpoint, and the flaw does not appear to require authentication, which widens its attack surface.

Generated by OpenCVE AI on April 18, 2026 at 20:09 UTC.

Remediation

Vendor Solution

The vulnerability has been fixed by the T-Systems team in version 2505.0.13. It is recommended to update the system software to this version or, failing that, to the latest stable version.


OpenCVE Recommended Actions

  • Upgrade the Buroweb platform to version 2505.0.13 or a newer stable release as published by T‑Systems.
  • Limit exposure of the vulnerable endpoint by applying a web‑application firewall rule that rejects or restricts access to /sta/CarpetaPublic/doEvent with APP_CODE=STA&PAGE_CODE=TABLON until the upgrade is completed.
  • Perform a vulnerability scan or targeted penetration test against the endpoint after the upgrade to confirm that the SQL injection issue has been removed before the system is fully operational.

Generated by OpenCVE AI on April 18, 2026 at 20:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Description SQL injection vulnerability in the Buroweb platform version 2505.0.12, specifically in the 'tablon' component. This vulnerability is present in several parameters that do not correctly sanitize user input in the endpoint '/sta/CarpetaPublic/doEvent?APP_CODE=STA&PAGE_CODE=TABLON'. Exploiting this vulnerability could allow an attacker to execute queries on the database and gain access to confidential information.
Title SQL injection (SQLi) on the Buroweb platform
First Time appeared T-systems
T-systems buroweb
Weaknesses CWE-89
CPEs cpe:2.3:a:t-systems:buroweb:*:*:*:*:*:*:*:*
Vendors & Products T-systems
T-systems buroweb
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:N/SA:L'}


Subscriptions

T-systems Buroweb
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-02-03T15:28:52.317Z

Reserved: 2026-01-26T12:24:50.541Z

Link: CVE-2026-1432

cve-icon Vulnrichment

Updated: 2026-02-03T15:28:44.904Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T12:16:11.777

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:15:09Z

Weaknesses