Impact
A vulnerability in Yonyou KSOA 9.0’s /worksheet/worksadd.jsp allows an attacker to inject arbitrary SQL through the ID parameter, which is passed to a database query without proper sanitization. This flaw is an SQL injection (CWE‑89) with improper input handling (CWE‑74).
Affected Systems
The affected product is Yonyou KSOA version 9.0, specifically the HTTP GET Parameter Handler component and the worksadd.jsp file; no other versions or subcomponents are listed as vulnerable.
Risk and Exploitability
The base CVSS score of 6.9 indicates moderate severity. The EPSS score is below 1%, suggesting a very low exploitation probability at the moment, and the vulnerability is not yet in the CISA KEV catalog. However, the exploit is public and can be performed remotely, meaning a successful attack could lead to unauthorized data modification or exposure, or denial of service.
OpenCVE Enrichment