Description
A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /kmf/edit_folder.jsp of the component HTTP GET Parameter Handler. Performing a manipulation of the argument folderid results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch ASAP
AI Analysis

Impact

The vulnerability resides in Yonyou KSOA 9.0 within the file /kmf/edit_folder.jsp, where manipulating the HTTP GET parameter folderid allows an attacker to inject arbitrary SQL statements. This flaw is a classic example of an input validation failure, corresponding to CWE‑74 and CWE‑89, and could enable unauthorized data exfiltration or modification if executed successfully.

Affected Systems

The affected product is Yonyou KSOA version 9.0. No other versions or additional products were listed as vulnerable. The absence of more granular version information suggests that the flaw is specific to that release of the application.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high severity, while the EPSS score of less than 1% signals a low likelihood of widespread exploitation at present. The vulnerability was publicly disclosed and is accessible remotely, but the vendor has not released a patch or workaround. Because the flaw can be triggered over the network, it poses a significant risk if exploited, yet current evidence suggests that active exploitation is unlikely in the near term.

Generated by OpenCVE AI on April 18, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict forensic HTTP access to /kmf/edit_folder.jsp by firewall or web‑ACL rules to limit exposure to trusted networks
  • Validate the folderid parameter on the server side, ensuring it matches expected numeric or alphanumeric patterns before inclusion in database queries
  • Rewrite the offending database code to use parameterized statements or stored procedures, removing direct concatenation of user input into SQL

Generated by OpenCVE AI on April 18, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Fri, 06 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Mon, 19 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /kmf/edit_folder.jsp of the component HTTP GET Parameter Handler. Performing a manipulation of the argument folderid results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter edit_folder.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:40:32.939Z

Reserved: 2026-01-18T07:13:50.269Z

Link: CVE-2026-1132

cve-icon Vulnrichment

Updated: 2026-01-20T15:30:41.034Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T02:15:57.020

Modified: 2026-02-06T19:40:02.173

Link: CVE-2026-1132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:00:04Z

Weaknesses