CVE-2025-15436: SQL Injection in Yonyou KSOA
A vulnerability has been found in Yonyou KSOA 9.0. Affected by this issue is some unknown functionality of the file /worksheet/work_edit.jsp. Such manipulation of the argument Report leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15436 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, a widely used enterprise resource planning (ERP) and office automation software suite. The vulnerability resides in the /worksheet/work_edit.jsp file, where the Report parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend SQL queries without requiring authentication or user interaction, potentially leading to unauthorized data retrieval, modification, or deletion. The vulnerability has been publicly disclosed, but no official patch or vendor response has been provided as of the publication date. The CVSS 4.0 base score of 6.9 reflects a medium severity level, considering the ease of exploitation (network accessible, no privileges or user interaction needed) but limited scope of impact (partial confidentiality, integrity, and availability impact). The lack of vendor response increases risk, as unpatched systems remain exposed. Exploitation could lead to data breaches, unauthorized data manipulation, or disruption of business processes relying on the affected database. Given Yonyou's significant market penetration in China and parts of Asia, this vulnerability poses a notable risk to organizations using KSOA 9.0 in those regions.
Potential Impact
The potential impact of CVE-2025-15436 is significant for organizations using Yonyou KSOA 9.0. Successful exploitation can lead to unauthorized access to sensitive business data, data corruption, or deletion, which can disrupt critical business operations. Confidentiality breaches could expose proprietary or personal information, leading to regulatory compliance issues and reputational damage. Integrity violations may result in incorrect business decisions based on tampered data. Availability impacts, while limited, could arise if injected queries cause database errors or crashes. Since the vulnerability requires no authentication and can be exploited remotely, attackers can launch attacks from anywhere, increasing the threat surface. The absence of vendor patches and public exploit disclosures heighten the urgency for organizations to implement mitigations. Industries relying heavily on Yonyou KSOA, such as manufacturing, finance, and government sectors in affected regions, face elevated risks of targeted attacks and data compromise.
Mitigation Recommendations
To mitigate CVE-2025-15436, organizations should immediately implement input validation and sanitization for the Report parameter and any other user-controllable inputs in the /worksheet/work_edit.jsp file. Employing parameterized queries or prepared statements is critical to prevent SQL injection attacks. Network-level protections such as web application firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Continuous monitoring and logging of database queries can help identify suspicious activities indicative of exploitation attempts. Organizations should isolate the affected system segments and restrict access to trusted users and networks where possible. Since no official patch is available, engaging with Yonyou for updates or workarounds is essential. Additionally, conducting regular security assessments and penetration testing focused on injection flaws will help identify and remediate similar vulnerabilities proactively.
Affected Countries
China, Singapore, Malaysia, Indonesia, Vietnam, Thailand, South Korea, Japan
CVE-2025-15436: SQL Injection in Yonyou KSOA
Description
A vulnerability has been found in Yonyou KSOA 9.0. Affected by this issue is some unknown functionality of the file /worksheet/work_edit.jsp. Such manipulation of the argument Report leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15436 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, a widely used enterprise resource planning (ERP) and office automation software suite. The vulnerability resides in the /worksheet/work_edit.jsp file, where the Report parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend SQL queries without requiring authentication or user interaction, potentially leading to unauthorized data retrieval, modification, or deletion. The vulnerability has been publicly disclosed, but no official patch or vendor response has been provided as of the publication date. The CVSS 4.0 base score of 6.9 reflects a medium severity level, considering the ease of exploitation (network accessible, no privileges or user interaction needed) but limited scope of impact (partial confidentiality, integrity, and availability impact). The lack of vendor response increases risk, as unpatched systems remain exposed. Exploitation could lead to data breaches, unauthorized data manipulation, or disruption of business processes relying on the affected database. Given Yonyou's significant market penetration in China and parts of Asia, this vulnerability poses a notable risk to organizations using KSOA 9.0 in those regions.
Potential Impact
The potential impact of CVE-2025-15436 is significant for organizations using Yonyou KSOA 9.0. Successful exploitation can lead to unauthorized access to sensitive business data, data corruption, or deletion, which can disrupt critical business operations. Confidentiality breaches could expose proprietary or personal information, leading to regulatory compliance issues and reputational damage. Integrity violations may result in incorrect business decisions based on tampered data. Availability impacts, while limited, could arise if injected queries cause database errors or crashes. Since the vulnerability requires no authentication and can be exploited remotely, attackers can launch attacks from anywhere, increasing the threat surface. The absence of vendor patches and public exploit disclosures heighten the urgency for organizations to implement mitigations. Industries relying heavily on Yonyou KSOA, such as manufacturing, finance, and government sectors in affected regions, face elevated risks of targeted attacks and data compromise.
Mitigation Recommendations
To mitigate CVE-2025-15436, organizations should immediately implement input validation and sanitization for the Report parameter and any other user-controllable inputs in the /worksheet/work_edit.jsp file. Employing parameterized queries or prepared statements is critical to prevent SQL injection attacks. Network-level protections such as web application firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting this endpoint. Continuous monitoring and logging of database queries can help identify suspicious activities indicative of exploitation attempts. Organizations should isolate the affected system segments and restrict access to trusted users and networks where possible. Since no official patch is available, engaging with Yonyou for updates or workarounds is essential. Additionally, conducting regular security assessments and penetration testing focused on injection flaws will help identify and remediate similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-01T18:23:41.968Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69577e3bdb813ff03ed8028d
Added to database: 1/2/2026, 8:13:47 AM
Last enriched: 2/23/2026, 11:03:36 PM
Last updated: 3/25/2026, 10:30:45 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.