Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15424: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2025-15424cvecve-2025-15424
Published: Fri Jan 02 2026 (01/02/2026, 02:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /worksheet/agent_worksdel.jsp of the component HTTP GET Parameter Handler. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/09/2026, 10:59:35 UTC

Technical Analysis

CVE-2025-15424 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, an enterprise resource planning (ERP) software widely used in business environments. The flaw exists in the HTTP GET parameter handler within the /worksheet/agent_worksdel.jsp file, where the 'ID' parameter is improperly sanitized. This lack of input validation allows remote attackers to inject malicious SQL queries directly into the backend database. Exploitation does not require authentication or user interaction, increasing the risk of automated attacks. The vulnerability can lead to unauthorized data disclosure, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of critical business data. The vendor was notified but has not issued a patch or response, and exploit code has been publicly released, raising the likelihood of exploitation. The CVSS 4.0 score of 6.9 reflects a medium severity rating, considering the attack vector is network-based, with low attack complexity and no privileges or user interaction required. The vulnerability affects only version 9.0 of Yonyou KSOA, and no mitigations or patches have been officially provided. Given the nature of ERP systems, exploitation could disrupt business operations and expose sensitive corporate information.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for those relying on Yonyou KSOA 9.0 for critical business processes. Successful exploitation could lead to unauthorized access to sensitive financial, operational, or personnel data, resulting in data breaches and regulatory non-compliance under GDPR. Integrity of business data could be compromised, leading to incorrect financial reporting or operational disruptions. Availability may also be affected if attackers execute destructive SQL commands or cause database corruption. The public availability of exploit code increases the risk of widespread attacks, including automated scanning and exploitation attempts. Organizations in sectors such as manufacturing, finance, and supply chain management, where Yonyou KSOA is prevalent, are particularly vulnerable. The lack of vendor response and patch availability prolongs exposure, increasing the window for attackers to exploit this vulnerability.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, deploy a web application firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/agent_worksdel.jsp. Second, implement strict input validation and sanitization at the application level if source code access is available, ensuring all user-supplied parameters are properly escaped or parameterized in SQL queries. Third, conduct thorough database activity monitoring to detect anomalous queries indicative of injection attempts. Fourth, restrict network access to the affected application to trusted IP ranges where possible, reducing exposure to external attackers. Fifth, maintain regular backups of critical data to enable recovery in case of data corruption or deletion. Finally, monitor threat intelligence feeds for updates on vendor patches or new exploit techniques and prepare for rapid deployment once a fix is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T11:12:29.384Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695737ecdb813ff03ea62d8a

Added to database: 1/2/2026, 3:13:48 AM

Last enriched: 1/9/2026, 10:59:35 AM

Last updated: 2/6/2026, 11:52:02 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats