Description
A weakness has been identified in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /kmf/save_folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to manipulate the folderid parameter in a GET request to the save_folder.jsp endpoint, leading to unfiltered input being incorporated into an SQL query. The result is a classic SQL injection that can expose, modify, or delete data from the underlying database. The weakness originates from the component HTTP GET Parameter Handler. The attacker needs only craft a malicious URL, confirming that the vulnerability can be exploited remotely.

Affected Systems

Yonyou KSOA version 9.0 is affected. The vendor Yonyou’s KSOA product contains the vulnerable file save_folder.jsp in the HTTP GET Parameter Handler. No other affected versions are listed.

Risk and Exploitability

The CVSS base score of 6.9 indicates a medium‑to‑high severity vulnerability. EPSS is <1%, indicating a low probability of exploitation, but a public exploit has been made available and the vendor has not responded. The likely attack vector is a remote crafted HTTP GET request. Although not listed in CISA KEV, the existence of a public exploit means this vulnerability should be treated as high risk and addressed urgently.

Generated by OpenCVE AI on April 18, 2026 at 04:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑provided patch or upgrade Yonyou KSOA to a version that removes the unfiltered folderid parameter in save_folder.jsp.
  • If a patch is unavailable, block or restrict access to the /kmf/save_folder.jsp endpoint using HTTP access controls or a web application firewall, ensuring only authenticated users can invoke it.
  • Enforce strict input validation on the folderid parameter, converting it to a numeric type or using parameterized queries before inclusion in SQL statements.
  • Monitor application logs for suspicious SQL error messages or unexpected query patterns, indicating an attempted injection.

Generated by OpenCVE AI on April 18, 2026 at 04:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Thu, 05 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Wed, 21 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Mon, 19 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /kmf/save_folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter save_folder.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:49:34.256Z

Reserved: 2026-01-19T07:33:45.859Z

Link: CVE-2026-1177

cve-icon Vulnrichment

Updated: 2026-01-21T20:42:28.846Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T22:16:02.080

Modified: 2026-02-05T19:51:49.187

Link: CVE-2026-1177

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:00:06Z

Weaknesses