Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1120: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2026-1120cvecve-2026-1120
Published: Sun Jan 18 2026 (01/18/2026, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

A vulnerability has been found in Yonyou KSOA 9.0. The impacted element is an unknown function of the file /worksheet/del_work.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:50:55 UTC

Technical Analysis

CVE-2026-1120 is a medium-severity SQL injection vulnerability affecting Yonyou KSOA version 9.0, a business application platform. The vulnerability resides in the /worksheet/del_work.jsp endpoint, where the HTTP GET parameter 'ID' is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring authentication or user interaction, making it relatively easy to exploit. Successful exploitation could lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the backend database. The CVSS 4.0 vector indicates no privileges or user interaction are needed, with partial impact on all three security properties. The vendor was informed but has not responded or issued a patch, and while no active exploits have been reported, the public disclosure increases the risk of future attacks. The vulnerability affects a critical component of the Yonyou KSOA system, which is widely used in enterprise environments, especially in China and the Asia-Pacific region. Given the lack of vendor remediation, organizations must rely on defensive controls and monitoring to mitigate potential exploitation.

Potential Impact

The impact of CVE-2026-1120 can be significant for organizations using Yonyou KSOA 9.0. Exploitation allows attackers to execute arbitrary SQL commands on the backend database remotely, potentially leading to unauthorized data disclosure, data tampering, or deletion. This compromises the confidentiality, integrity, and availability of sensitive business data managed by the platform. Since the vulnerability requires no authentication or user interaction, it can be exploited by any remote attacker with network access to the affected endpoint, increasing the attack surface. Organizations may face operational disruptions, data breaches, and compliance violations if exploited. The absence of a vendor patch exacerbates the risk, as organizations must implement compensating controls. The threat is particularly critical for enterprises relying heavily on Yonyou KSOA for workflow and business process management, especially in sectors with sensitive or regulated data.

Mitigation Recommendations

To mitigate CVE-2026-1120, organizations should implement the following specific measures: 1) Apply strict input validation and sanitization on the 'ID' parameter at the web application level to prevent injection of malicious SQL code. 2) Deploy a Web Application Firewall (WAF) with custom rules to detect and block SQL injection attempts targeting the /worksheet/del_work.jsp endpoint. 3) Restrict network access to the affected application to trusted IP ranges and enforce strong network segmentation to limit exposure. 4) Monitor database logs and application logs for unusual queries or error messages indicative of injection attempts. 5) If possible, upgrade or patch the application once the vendor releases a fix; meanwhile, consider isolating the vulnerable component or disabling the affected functionality if feasible. 6) Conduct regular security assessments and penetration testing focused on injection vulnerabilities. 7) Educate development and operations teams on secure coding practices and the importance of parameterized queries or prepared statements to prevent SQL injection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T18:15:51.348Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696cdf95d302b072d9cc70e0

Added to database: 1/18/2026, 1:26:45 PM

Last enriched: 2/23/2026, 10:50:55 PM

Last updated: 3/25/2026, 2:45:26 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses