INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 25m Global insider Cybersecurity Services CRITICAL 34m Global ransomware Multiple sectors (U.S. companies) CRITICAL 48m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 25m Global insider Cybersecurity Services CRITICAL 34m Global ransomware Multiple sectors (U.S. companies) CRITICAL 48m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 25m Global insider Cybersecurity Services CRITICAL 34m Global ransomware Multiple sectors (U.S. companies) CRITICAL 48m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2026-21856

High ⚡ Exploit Available
Time-Based Blind SQL Injection in Tarkov Data Manager Webhook and Scanner APIs
CWE-89 — Weakness Type
Published: Jan 7, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.2
🔗 NVD Official
📄 Description (English)

The Tarkov Data Manager is a tool to manage the Tarkov item data. Prior to commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8, a time based blind SQL injection vulnerability in the webhook edit and scanner api endpoints that allow an authenticated attacker to execute arbitrary SQL queries against the MySQL database. Commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8 contains a patch.

🤖 AI Executive Summary

A time-based blind SQL injection vulnerability (CVE-2026-21856) exists in Tarkov Data Manager's webhook edit and scanner API endpoints, allowing authenticated attackers to execute arbitrary SQL queries against the MySQL database with a CVSS score of 7.2. The vulnerability has been patched in commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8, and active exploits are available.

📄 Description (Arabic)

تسمح هذه الثغرة الأمنية للمهاجمين المصادق عليهم باستغلال نقاط ضعف حقن SQL في واجهات برمجة التطبيقات الخاصة بتحرير الويب هوك والماسح الضوئي لتنفيذ استعلامات SQL خبيثة ضد قاعدة بيانات MySQL. تستخدم تقنية الحقن العمياء المعتمدة على الوقت لاستخراج البيانات الحساسة من قاعدة البيانات دون الحاجة إلى رؤية النتائج مباشرة. يمكن للمهاجمين الوصول إلى معلومات سرية، تعديل البيانات، أو تنفيذ أوامر إدارية على قاعدة البيانات. تصنف الثغرة ضمن CWE-89 وتحمل درجة خطورة عالية بسبب إمكانية الوصول غير المصرح به للبيانات الحساسة.

🤖 ملخص تنفيذي (AI)

توجد ثغرة حقن SQL العمياء المعتمدة على الوقت (CVE-2026-21856) في نقاط نهاية واجهة برمجة التطبيقات لتحرير الويب هوك والماسح الضوئي في مدير بيانات تاركوف، مما يسمح للمهاجمين المصادق عليهم بتنفيذ استعلامات SQL عشوائية ضد قاعدة بيانات MySQL بدرجة خطورة 7.2. تم إصلاح الثغرة في الالتزام 9bdb3a75a98a7047b6d70144eb1da1655d6992a8، وتتوفر استغلالات نشطة للثغرة.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:46
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Tarkov Data Manager for inventory or data management systems face risks of unauthorized database access, data exfiltration, and potential manipulation of critical business data. This is particularly concerning for gaming, entertainment, and technology sectors that may utilize similar data management tools and could expose customer information, financial records, or operational data to authenticated insider threats.
🏢 Affected Saudi Sectors
قطاع الألعاب الإلكترونية قطاع الترفيه الرقمي قطاع تقنية المعلومات قطاع التجارة الإلكترونية قطاع إدارة البيانات
⚖️ Saudi Risk Score (AI)
7.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately update Tarkov Data Manager to commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8 or later version that includes the SQL injection patch and verify the update through version control systems.
2. Implement parameterized queries and prepared statements across all database interactions, conduct comprehensive code review of webhook and scanner API endpoints, and deploy web application firewalls (WAF) with SQL injection detection rules.
3. Review database access logs for suspicious time-based query patterns, revoke and rotate credentials for all authenticated users with API access, implement principle of least privilege for database accounts, and establish continuous monitoring for abnormal database query execution times.
🔧 خطوات المعالجة (العربية)
1. تحديث مدير بيانات تاركوف فوراً إلى الالتزام 9bdb3a75a98a7047b6d70144eb1da1655d6992a8 أو إصدار أحدث يتضمن إصلاح ثغرة حقن SQL والتحقق من التحديث من خلال أنظمة التحكم في الإصدارات.
2. تنفيذ الاستعلامات المعلمية والبيانات المحضرة عبر جميع تفاعلات قاعدة البيانات، وإجراء مراجعة شاملة للكود لنقاط نهاية واجهة برمجة التطبيقات للويب هوك والماسح الضوئي، ونشر جدران حماية تطبيقات الويب (WAF) مع قواعد كشف حقن SQL.
3. مراجعة سجلات الوصول إلى قاعدة البيانات للبحث عن أنماط استعلامات مشبوهة معتمدة على الوقت، وإلغاء وتدوير بيانات الاعتماد لجميع المستخدمين المصادق عليهم الذين لديهم وصول لواجهة برمجة التطبيقات، وتنفيذ مبدأ الامتيازات الأقل لحسابات قاعدة البيانات، وإنشاء مراقبة مستمرة لأوقات تنفيذ استعلامات قاعدة البيانات غير الطبيعية.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 ECC-2-1 ECC-3-1 ECC-4-3 ECC-5-2
🔵 SAMA CSF
CCC-1.1.1 CCC-2.2.1 CCC-3.1.1 CCC-4.2.1 CCC-5.1.1
🟡 ISO 27001:2022
A.8.9 A.8.16 A.12.6.1 A.14.2.1 A.18.1.3
📦 Affected Products / CPE 1 entries
tarkov:tarkov_data_manager
📊 CVSS Score
7.2
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredH — High
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score7.2
CWECWE-89
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-07
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
7.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available patch-available CWE-89
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.