Description
A vulnerability was detected in Yonyou KSOA 9.0. This affects an unknown part of the file /kmf/user_popedom.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument folderid results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection with remote exploitation potential
Action: Immediate Patch
AI Analysis

Impact

A potential SQL injection flaw exists in the Yonyou KSOA 9.0 component that handles HTTP GET parameters for the /kmf/user_popedom.jsp page. Manipulating the folderid argument allows attackers to inject arbitrary SQL code. This can enable unauthorized data disclosure, manipulation of database records, and potential escalation of privileges if the injected payload attacks application logic or database triggers. The weakness is classified as CWE-74 and CWE-89, reflecting improper handling of user‑supplied input and unescaped SQL.

Affected Systems

Vendor: Yonyou. Product: KSOA version 9.0, relevant to clients running that specific release of the KSOA enterprise resource planning suite. The affected code resides at /kmf/user_popedom.jsp and is accessible through HTTP GET requests.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity for this threat, while the EPSS score of less than 1 % suggests that exploitation is currently unlikely at a large scale. However, because the vulnerability is publicly documented and can be triggered remotely via a standard HTTP request to the affected endpoint, its practical risk remains noteworthy for organizations running the vulnerable KSOA version. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, but its remote exploitation potential warrants immediate attention. The likely attack vector is through a maliciously crafted GET request targeting the folderid query parameter, leading to direct injection into the database engine.

Generated by OpenCVE AI on April 18, 2026 at 04:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Patch or upgrade Yonyou KSOA to the latest version that contains an input sanitization fix for folderid (e.g., upgrade to 9.1 or later if available).
  • If a patch is not yet available, restrict access to the /kmf/user_popedom.jsp endpoint to trusted IP addresses and apply a Web Application Firewall rule that rejects suspicious folderid patterns.
  • Implement server‑side validation or parameterized queries for the folderid argument to ensure only safe, expected values reach the database engine.

Generated by OpenCVE AI on April 18, 2026 at 04:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:*:*:*:*:*:*:*:*

Thu, 05 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:*

Wed, 21 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Yonyou
Yonyou ksoa
Vendors & Products Yonyou
Yonyou ksoa

Mon, 19 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Yonyou KSOA 9.0. This affects an unknown part of the file /kmf/user_popedom.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument folderid results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Yonyou KSOA HTTP GET Parameter user_popedom.jsp sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:49:59.297Z

Reserved: 2026-01-19T07:33:59.730Z

Link: CVE-2026-1179

cve-icon Vulnrichment

Updated: 2026-01-21T20:31:48.288Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T23:16:02.870

Modified: 2026-02-05T20:00:29.210

Link: CVE-2026-1179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:00:06Z

Weaknesses