Description
A security flaw has been discovered in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /worksheet/work_report.jsp of the component HTTP GET Parameter Handler. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch Immediately
AI Analysis

Impact

The vulnerability resides in the /worksheet/work_report.jsp HTTP GET Parameter Handler of Yonyou KSOA 9.0. Manipulating the ID argument injects malicious SQL directly into a backend query, allowing an attacker to read, alter, or delete data stored in the database. Because the flaw is exposed through a normal HTTP GET request, the attacker can potentially compromise the confidentiality, integrity, or availability of the application’s data without requiring prior authentication.

Affected Systems

Yonyou KSOA version 9.0 is the affected product. The vulnerability is present in the KSOA 9.0 release and is referenced by the corresponding CPE string.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate risk, and the EPSS score of less than 1% shows that while exploitation is theoretically possible, it is not currently common. The exploit code is publicly available and can be executed over the network by sending a crafted GET request to work_report.jsp. The lack of a publicly available patch and absence from the CISA KEV list mean that system administrators should treat this as a high priority to mitigate potential damage.

Generated by OpenCVE AI on April 18, 2026 at 05:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available update or patch for Yonyou KSOA 9.0 that corrects the SQL injection in work_report.jsp.
  • If a fix is not yet released, deploy web‑application firewall rules or input‑validation filters that reject non‑numeric values for the ID parameter or block typical SQL injection payload patterns on that endpoint.
  • Implement application‑level checks to ensure the ID argument is strictly numeric and use parameterized queries or stored procedures so that user input cannot alter the SQL statement structure.

Generated by OpenCVE AI on April 18, 2026 at 05:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Sun, 18 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /worksheet/work_report.jsp of the component HTTP GET Parameter Handler. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter work_report.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:39:07.694Z

Reserved: 2026-01-17T18:16:02.784Z

Link: CVE-2026-1124

cve-icon Vulnrichment

Updated: 2026-01-20T16:43:37.337Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T16:15:50.630

Modified: 2026-02-10T17:11:34.160

Link: CVE-2026-1124

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses