Description
A vulnerability has been found in Yonyou KSOA 9.0. The impacted element is an unknown function of the file /worksheet/del_work.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Patch
AI Analysis

Impact

Yonyou KSOA 9.0 contains a flaw in its HTTP GET parameter handling at /worksheet/del_work.jsp; manipulating the ID parameter allows an attacker to inject arbitrary SQL. This vulnerability is a classic database injection that can lead to unauthorized data access, tampering, or even full database compromise. The weakness is identified as CWE-74 and CWE-89, representing malformed URL handling and SQL injection respectively.

Affected Systems

The affected application is Yonyou KSOA version 9.0, specifically the /worksheet/del_work.jsp resource. No other versions or components are listed as affected.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity risk, and the EPSS score of less than 1% suggests that the likelihood of exploitation is currently low. The vulnerability is not listed in the CISA KEV catalog, but it has been publicly disclosed and an exploit is available, making it a potential threat once a suitable target is identified. Remote exploitation can be performed by submitting a crafted ID parameter via standard HTTP GET requests, and because Yonyou did not respond to the vendor communication, no official fix is known at this time. The risk thus depends on whether the system is exposed to untrusted users and whether adequate input validation or network segmentation is in place.

Generated by OpenCVE AI on April 18, 2026 at 05:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Yonyou KSOA to a version that contains the fix for the del_work.jsp SQL injection vulnerability.
  • Block or restrict external access to the /worksheet/del_work.jsp endpoint using firewall rules or web‑application firewall policies.
  • Implement input validation to ensure the ID parameter contains only safe, expected values and use parameterized queries to eliminate injection risks.

Generated by OpenCVE AI on April 18, 2026 at 05:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Mon, 09 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Sun, 18 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Yonyou KSOA 9.0. The impacted element is an unknown function of the file /worksheet/del_work.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter del_work.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:38:18.230Z

Reserved: 2026-01-17T18:15:51.348Z

Link: CVE-2026-1120

cve-icon Vulnrichment

Updated: 2026-01-20T16:51:02.924Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T14:16:16.387

Modified: 2026-02-09T20:22:24.607

Link: CVE-2026-1120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses