Description
A vulnerability was found in Yonyou KSOA 9.0. This affects an unknown function of the file /worksheet/del_workplan.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is caused by insufficient validation of the ID argument in the del_workplan.jsp handler, which allows an attacker to inject arbitrary SQL statements. This is identified as a SQL injection flaw, as indicated by CWE-89. Based on the nature of SQL injection, an attacker could potentially retrieve, modify or delete data in the database, compromising confidentiality and integrity. The potential impact includes data disclosure, modification, or corruption of the underlying database, which would further compromise the application’s data security.

Affected Systems

The affected product is Yonyou KSOA version 9.0, as specified by the vendor name and the CPE entries. No other versions are listed as vulnerable in the provided information.

Risk and Exploitability

The CVSS score of 6.9 rates the issue as medium severity, while the EPSS score of less than 1% indicates a low probability of exploitation at this time. The vulnerability is publicly disclosed and can be launched remotely, but it is not listed in the CISA Known Exploited Vulnerabilities catalog. Though exploitation is unlikely, the remote nature of the attack vector presents a significant risk to organizations that have not patched or mitigated the flaw.

Generated by OpenCVE AI on April 18, 2026 at 15:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Yonyou KSOA to a version that implements proper validation for the ID parameter in del_workplan.jsp.
  • Restrict external access to the /worksheet/del_workplan.jsp endpoint; configure the web server or firewall to block HTTP GET requests to the resource from untrusted networks.
  • Apply input filtering so that only numeric values are accepted for the ID parameter, thereby preventing malformed SQL that could lead to injection attacks.

Generated by OpenCVE AI on April 18, 2026 at 15:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Mon, 09 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Sun, 18 Jan 2026 13:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Yonyou KSOA 9.0. This affects an unknown function of the file /worksheet/del_workplan.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter del_workplan.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:38:29.799Z

Reserved: 2026-01-17T18:15:54.301Z

Link: CVE-2026-1121

cve-icon Vulnrichment

Updated: 2026-01-20T16:49:59.132Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T14:16:16.597

Modified: 2026-02-09T20:21:45.273

Link: CVE-2026-1121

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:00:04Z

Weaknesses