Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15435: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2025-15435cvecve-2025-15435
Published: Fri Jan 02 2026 (01/02/2026, 07:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

A flaw has been found in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /worksheet/work_update.jsp. This manipulation of the argument Report causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/09/2026, 10:53:24 UTC

Technical Analysis

CVE-2025-15435 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting an unspecified functionality within the /worksheet/work_update.jsp endpoint. The vulnerability arises from improper sanitization of the 'Report' parameter, allowing an attacker to inject malicious SQL queries remotely without requiring authentication or user interaction. The CVSS 4.0 score is 6.9 (medium), reflecting the network attack vector, low complexity, and no privileges or user interaction needed. The impact includes partial compromise of confidentiality, integrity, and availability, as attackers could extract sensitive data, modify database contents, or disrupt service. The vendor was notified but has not issued a patch or response, and although an exploit is publicly available, no active exploitation has been reported. This vulnerability poses a significant risk to organizations relying on Yonyou KSOA 9.0, especially in environments where the affected endpoint is exposed to untrusted networks. The lack of vendor response and patch increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive business data, data manipulation, and potential service disruption. Given Yonyou KSOA's role in enterprise resource planning and workflow management, successful attacks may compromise operational integrity and confidentiality of corporate data. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations due to data breaches), and reputational damage. The medium severity rating indicates moderate but tangible risks, especially if attackers leverage the vulnerability to pivot within networks or exfiltrate data. Organizations with exposed or poorly segmented KSOA deployments are particularly vulnerable. The absence of vendor patches means that reliance on internal security measures is critical to prevent exploitation.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the 'Report' parameter at the application level to block malicious SQL payloads. 2. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the /worksheet/work_update.jsp endpoint. 3. Restrict network access to the KSOA application, limiting exposure to trusted internal networks and VPNs only. 4. Conduct thorough code reviews and penetration testing focused on SQL injection vectors within the application. 5. Monitor logs for unusual database queries or failed injection attempts to detect early exploitation signs. 6. Segment the network to isolate critical systems and reduce lateral movement opportunities. 7. Engage with Yonyou support channels regularly for updates or patches and consider alternative solutions if vendor support remains absent. 8. Prepare incident response plans specifically addressing potential SQL injection exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T18:23:38.275Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69577733db813ff03ed646cb

Added to database: 1/2/2026, 7:43:47 AM

Last enriched: 1/9/2026, 10:53:24 AM

Last updated: 2/7/2026, 12:03:54 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats