Description
A vulnerability was determined in Yonyou KSOA 9.0. This impacts an unknown function of the file /worksheet/work_info.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to potential data exposure or modification
Action: Patch
AI Analysis

Impact

A SQL injection flaw exists in the HTTP GET parameter handler of the /worksheet/work_info.jsp file in Yonyou KSOA. When the ID argument is manipulated, an attacker can inject arbitrary SQL statements, allowing unauthorized read or modification of the database. The vulnerability is exploitable remotely via a crafted HTTP GET request and has been publicly disclosed, meaning the attack vector is widely available.

Affected Systems

Yonyou KSOA version 9.0 is affected. Systems running this version without a vendor patch are vulnerable; the issue is specific to the web component that processes GET parameters for the work_info.jsp page.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate severity with the potential for significant impact if exploited. The EPSS score of less than 1% indicates that, at the time of analysis, the likelihood of exploitation is low, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, the flaw can be leveraged remotely through ordinary HTTP traffic, making it a valid concern for environments exposed to the internet or untrusted networks.

Generated by OpenCVE AI on April 18, 2026 at 05:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's patch or upgrade to a fixed version of Yonyou KSOA
  • Restrict network access to the /worksheet/work_info.jsp endpoint or place the application behind a firewall that limits exposure to trusted hosts
  • Implement input validation and parameter binding on the ID query parameter to prevent SQL injection

Generated by OpenCVE AI on April 18, 2026 at 05:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Mon, 09 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Sun, 18 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Yonyou KSOA 9.0. This impacts an unknown function of the file /worksheet/work_info.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter work_info.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:38:42.389Z

Reserved: 2026-01-17T18:15:57.044Z

Link: CVE-2026-1122

cve-icon Vulnrichment

Updated: 2026-01-20T16:47:48.782Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T14:16:16.783

Modified: 2026-02-09T20:19:05.913

Link: CVE-2026-1122

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses