Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1120: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2026-1120cvecve-2026-1120
Published: Sun Jan 18 2026 (01/18/2026, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

CVE-2026-1120 is a medium-severity SQL injection vulnerability in Yonyou KSOA version 9. 0, specifically in the /worksheet/del_work. jsp file via the HTTP GET parameter 'ID'. This flaw allows unauthenticated remote attackers to manipulate SQL queries, potentially leading to unauthorized data access or modification. Although the vendor has not responded to the disclosure, no public exploits are currently known. The vulnerability impacts confidentiality, integrity, and availability to a limited extent and requires no user interaction or privileges to exploit. European organizations using Yonyou KSOA 9. 0, especially in sectors relying on this ERP system, should prioritize mitigation. Countries with significant adoption of Yonyou products and strategic industries using ERP solutions are at higher risk. Immediate mitigation involves input validation, web application firewalls, and monitoring unusual database activity.

AI-Powered Analysis

AILast updated: 01/18/2026, 13:41:04 UTC

Technical Analysis

CVE-2026-1120 identifies a SQL injection vulnerability in Yonyou KSOA version 9.0, located in the /worksheet/del_work.jsp component. The vulnerability arises from improper sanitization of the 'ID' parameter in an HTTP GET request, allowing an attacker to inject arbitrary SQL commands. This injection flaw can be exploited remotely without authentication or user interaction, making it accessible to any attacker with network access to the affected service. Successful exploitation could lead to unauthorized reading, modification, or deletion of database records, potentially compromising sensitive business data managed by the ERP system. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation (low attack complexity, no privileges required) but limited impact scope (partial confidentiality, integrity, and availability impacts). The vendor Yonyou has not issued a patch or responded to the disclosure, and no known exploits are currently in the wild, though public disclosure increases the risk of future exploitation. The vulnerability affects a critical business application component, making it a significant concern for organizations relying on Yonyou KSOA for enterprise resource planning and workflow management.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data exposure and manipulation within the Yonyou KSOA ERP system, potentially disrupting business operations and compromising sensitive corporate information. The ability to execute SQL injection remotely without authentication increases the threat level, especially for organizations with internet-facing KSOA instances or insufficient network segmentation. Data integrity issues could affect financial records, project management data, or other critical workflows managed by the system. Confidentiality breaches could expose intellectual property or personal data, raising compliance concerns under GDPR. Availability impacts, while limited, could still disrupt business continuity if database integrity is compromised. The lack of vendor response and patch availability heightens the risk, necessitating immediate compensating controls. European entities in manufacturing, finance, and government sectors using Yonyou products are particularly vulnerable due to the strategic importance of ERP systems in these industries.

Mitigation Recommendations

1. Implement strict input validation and parameterized queries on all user inputs, especially the 'ID' parameter in /worksheet/del_work.jsp, to prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) with updated rules to detect and block SQL injection attempts targeting Yonyou KSOA endpoints. 3. Restrict network access to the KSOA application, limiting exposure to trusted internal networks and VPNs only. 4. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 5. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 6. Engage with Yonyou support channels to request official patches or guidance and track any future updates. 7. If feasible, isolate the affected application components in segmented network zones to minimize lateral movement risk. 8. Educate IT and security teams about this specific vulnerability and ensure incident response plans include SQL injection scenarios. 9. Consider deploying runtime application self-protection (RASP) tools to detect and block injection attacks in real time. 10. Prepare for potential incident response by backing up critical data and verifying recovery procedures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T18:15:51.348Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696cdf95d302b072d9cc70e0

Added to database: 1/18/2026, 1:26:45 PM

Last enriched: 1/18/2026, 1:41:04 PM

Last updated: 1/18/2026, 3:36:30 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats