CVE-2025-15424: SQL Injection in Yonyou KSOA
A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /worksheet/agent_worksdel.jsp of the component HTTP GET Parameter Handler. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15424 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, an enterprise resource planning (ERP) software widely used in business environments. The flaw exists in the HTTP GET parameter handler within the /worksheet/agent_worksdel.jsp file, where the 'ID' parameter is improperly sanitized. This lack of input validation allows remote attackers to inject malicious SQL queries directly into the backend database. Exploitation does not require authentication or user interaction, increasing the risk of automated attacks. The vulnerability can lead to unauthorized data disclosure, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of critical business data. The vendor was notified but has not issued a patch or response, and exploit code has been publicly released, raising the likelihood of exploitation. The CVSS 4.0 score of 6.9 reflects a medium severity rating, considering the attack vector is network-based, with low attack complexity and no privileges or user interaction required. The vulnerability affects only version 9.0 of Yonyou KSOA, and no mitigations or patches have been officially provided. Given the nature of ERP systems, exploitation could disrupt business operations and expose sensitive corporate information.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on Yonyou KSOA 9.0 for critical business processes. Successful exploitation could lead to unauthorized access to sensitive financial, operational, or personnel data, resulting in data breaches and regulatory non-compliance under GDPR. Integrity of business data could be compromised, leading to incorrect financial reporting or operational disruptions. Availability may also be affected if attackers execute destructive SQL commands or cause database corruption. The public availability of exploit code increases the risk of widespread attacks, including automated scanning and exploitation attempts. Organizations in sectors such as manufacturing, finance, and supply chain management, where Yonyou KSOA is prevalent, are particularly vulnerable. The lack of vendor response and patch availability prolongs exposure, increasing the window for attackers to exploit this vulnerability.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, deploy a web application firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/agent_worksdel.jsp. Second, implement strict input validation and sanitization at the application level if source code access is available, ensuring all user-supplied parameters are properly escaped or parameterized in SQL queries. Third, conduct thorough database activity monitoring to detect anomalous queries indicative of injection attempts. Fourth, restrict network access to the affected application to trusted IP ranges where possible, reducing exposure to external attackers. Fifth, maintain regular backups of critical data to enable recovery in case of data corruption or deletion. Finally, monitor threat intelligence feeds for updates on vendor patches or new exploit techniques and prepare for rapid deployment once a fix is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-15424: SQL Injection in Yonyou KSOA
Description
A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /worksheet/agent_worksdel.jsp of the component HTTP GET Parameter Handler. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15424 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, an enterprise resource planning (ERP) software widely used in business environments. The flaw exists in the HTTP GET parameter handler within the /worksheet/agent_worksdel.jsp file, where the 'ID' parameter is improperly sanitized. This lack of input validation allows remote attackers to inject malicious SQL queries directly into the backend database. Exploitation does not require authentication or user interaction, increasing the risk of automated attacks. The vulnerability can lead to unauthorized data disclosure, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of critical business data. The vendor was notified but has not issued a patch or response, and exploit code has been publicly released, raising the likelihood of exploitation. The CVSS 4.0 score of 6.9 reflects a medium severity rating, considering the attack vector is network-based, with low attack complexity and no privileges or user interaction required. The vulnerability affects only version 9.0 of Yonyou KSOA, and no mitigations or patches have been officially provided. Given the nature of ERP systems, exploitation could disrupt business operations and expose sensitive corporate information.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on Yonyou KSOA 9.0 for critical business processes. Successful exploitation could lead to unauthorized access to sensitive financial, operational, or personnel data, resulting in data breaches and regulatory non-compliance under GDPR. Integrity of business data could be compromised, leading to incorrect financial reporting or operational disruptions. Availability may also be affected if attackers execute destructive SQL commands or cause database corruption. The public availability of exploit code increases the risk of widespread attacks, including automated scanning and exploitation attempts. Organizations in sectors such as manufacturing, finance, and supply chain management, where Yonyou KSOA is prevalent, are particularly vulnerable. The lack of vendor response and patch availability prolongs exposure, increasing the window for attackers to exploit this vulnerability.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, deploy a web application firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/agent_worksdel.jsp. Second, implement strict input validation and sanitization at the application level if source code access is available, ensuring all user-supplied parameters are properly escaped or parameterized in SQL queries. Third, conduct thorough database activity monitoring to detect anomalous queries indicative of injection attempts. Fourth, restrict network access to the affected application to trusted IP ranges where possible, reducing exposure to external attackers. Fifth, maintain regular backups of critical data to enable recovery in case of data corruption or deletion. Finally, monitor threat intelligence feeds for updates on vendor patches or new exploit techniques and prepare for rapid deployment once a fix is available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-01T11:12:29.384Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695737ecdb813ff03ea62d8a
Added to database: 1/2/2026, 3:13:48 AM
Last enriched: 1/9/2026, 10:59:35 AM
Last updated: 2/6/2026, 11:52:02 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.