Description
A vulnerability was identified in Yonyou KSOA 9.0. Affected is an unknown function of the file /worksheet/work_mod.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Fix
AI Analysis

Impact

A vulnerability was discovered in Yonyou KSOA 9.0 that allows an attacker to manipulate the ID parameter in the /worksheet/work_mod.jsp HTTP GET request. This manipulation can place arbitrary SQL code into the query executed by the server, enabling untrusted input to influence the database logic. The flaw is classified as a SQL injection weakness, which can lead to unauthorized data disclosure, modification, or deletion, and potentially compromise system integrity and confidentiality.

Affected Systems

The affected component is the KSOA 9.0 application from Yonyou, specifically the work_mod.jsp handler in the worksheet module. No additional versions are listed; the known CPE entries point to version 9.0, while the generic string covers all 9.x releases.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. The EPSS score shows a probability of exploitation of less than 1%, suggesting it is not widely observed, yet the vulnerability is publicly documented and an exploit is available. The issue can be triggered remotely without authentication, and the vendor has not responded to disclosure. Because it is not present in CISA’s KEV catalog, it is not a known exploited vulnerability at the time of analysis. The primary attack vector is a remote unauthenticated HTTP GET request, and the impact is limited to the scope of the application’s database access.

Generated by OpenCVE AI on April 18, 2026 at 05:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or upgrade to a newer, non‑vulnerable release of Yonyou KSOA when available.
  • Restrict or remove anonymous access to the /worksheet/work_mod.jsp endpoint, ensuring that only authenticated users with appropriate privileges can invoke it.
  • Implement input validation or parameterized queries in the application to sanitize the ID parameter, or deploy a web application firewall to block SQL injection payloads targeting this endpoint.

Generated by OpenCVE AI on April 18, 2026 at 05:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Mon, 09 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Sun, 18 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Yonyou KSOA 9.0. Affected is an unknown function of the file /worksheet/work_mod.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter work_mod.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:38:54.306Z

Reserved: 2026-01-17T18:15:59.885Z

Link: CVE-2026-1123

cve-icon Vulnrichment

Updated: 2026-01-20T16:46:47.950Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T15:15:51.167

Modified: 2026-02-09T20:13:50.250

Link: CVE-2026-1123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses