Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14185: SQL Injection in Yonyou U8 Cloud

0
Medium
VulnerabilityCVE-2025-14185cvecve-2025-14185
Published: Sun Dec 07 2025 (12/07/2025, 05:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: U8 Cloud

Description

A vulnerability was identified in Yonyou U8 Cloud 5.0/5.0sp/5.1/5.1sp. The affected element is an unknown function of the file nc/pubitf/erm/mobile/appservice/AppServletService.class. Such manipulation of the argument usercode leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 05:08:51 UTC

Technical Analysis

CVE-2025-14185 is a SQL injection vulnerability identified in Yonyou U8 Cloud versions 5.0, 5.0sp, 5.1, and 5.1sp. The vulnerability resides in an unknown function within the Java class file nc/pubitf/erm/mobile/appservice/AppServletService.class, specifically involving the 'usercode' parameter. Improper input validation or sanitization of this parameter allows an attacker to inject malicious SQL statements remotely, without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact includes potential unauthorized access to or modification of the backend database, which could compromise confidentiality, integrity, and availability of data. The exploit code is publicly available, increasing the risk of exploitation, although no active exploitation has been reported. The vendor was contacted but has not issued any response or patch, leaving affected systems exposed. Given the critical role of Yonyou U8 Cloud in enterprise resource planning and financial management, exploitation could disrupt business operations and lead to data breaches.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on Yonyou U8 Cloud for financial, operational, or enterprise resource planning functions. Successful exploitation could lead to unauthorized disclosure of sensitive corporate data, manipulation of financial records, or disruption of critical business processes. This could result in regulatory non-compliance, particularly under GDPR, leading to legal penalties and reputational damage. Additionally, the ability to remotely exploit the vulnerability without authentication increases the attack surface and risk. Organizations in sectors such as manufacturing, finance, and supply chain management that utilize Yonyou products may face operational downtime and loss of data integrity, impacting business continuity and trust.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the Yonyou U8 Cloud application servers by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2) Deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'usercode' parameter. 3) Conducting thorough input validation and sanitization at the application layer if customization is possible. 4) Monitoring logs and network traffic for unusual database queries or injection patterns. 5) Applying the principle of least privilege to database accounts used by the application to minimize potential damage. 6) Planning for rapid patch deployment once the vendor releases an official fix. 7) Educating IT and security teams about this vulnerability and ensuring incident response plans are updated to address potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T13:52:01.403Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69350bd6d5925d6ea2ce785f

Added to database: 12/7/2025, 5:08:38 AM

Last enriched: 12/7/2025, 5:08:51 AM

Last updated: 12/7/2025, 3:57:52 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats