CVE-2026-1121: SQL Injection in Yonyou KSOA
A vulnerability was found in Yonyou KSOA 9.0. This affects an unknown function of the file /worksheet/del_workplan.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1121 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, specifically in the HTTP GET parameter handler for the 'ID' argument within the /worksheet/del_workplan.jsp file. This vulnerability allows an unauthenticated remote attacker to inject arbitrary SQL commands by manipulating the 'ID' parameter, potentially leading to unauthorized data access, data modification, or deletion within the backend database. The vulnerability does not require any user interaction or privileges, making it straightforward to exploit remotely over the network. The vendor was notified early but has not issued any patch or mitigation guidance, and public exploit code has been released, increasing the risk of active exploitation. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability affects only version 9.0 of Yonyou KSOA, a widely used enterprise resource planning (ERP) system, primarily deployed in business environments. The lack of patch availability and public exploit presence necessitate immediate defensive measures to prevent exploitation.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive business data, including financial records, employee information, and operational plans managed within Yonyou KSOA. Attackers could manipulate or delete critical data, causing operational disruptions and financial losses. The integrity of business processes relying on the ERP system could be compromised, potentially affecting supply chain management, human resources, and accounting functions. Confidentiality breaches could result in regulatory non-compliance under GDPR, leading to legal penalties and reputational damage. Availability impacts could arise if attackers execute destructive SQL commands or cause database corruption, leading to downtime. The presence of public exploits and lack of vendor response increase the likelihood of targeted attacks, especially against organizations with high-value data or strategic importance in Europe’s industrial and commercial sectors.
Mitigation Recommendations
1. Implement immediate input validation and sanitization on the 'ID' parameter in /worksheet/del_workplan.jsp to prevent SQL injection, using parameterized queries or prepared statements. 2. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting Yonyou KSOA endpoints. 3. Restrict network access to the affected application, limiting exposure to trusted internal networks or VPN users only. 4. Monitor application logs and network traffic for unusual or suspicious activity related to the vulnerable endpoint. 5. Conduct a thorough security audit of the entire Yonyou KSOA deployment to identify and remediate other potential injection points. 6. Engage with Yonyou or third-party security vendors for potential patches or workarounds and plan for an upgrade once a fix is available. 7. Educate IT and security teams on the risks and detection methods for SQL injection attacks specific to this product. 8. Consider database-level protections such as least privilege access and query execution restrictions to limit damage if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2026-1121: SQL Injection in Yonyou KSOA
Description
A vulnerability was found in Yonyou KSOA 9.0. This affects an unknown function of the file /worksheet/del_workplan.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-1121 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, specifically in the HTTP GET parameter handler for the 'ID' argument within the /worksheet/del_workplan.jsp file. This vulnerability allows an unauthenticated remote attacker to inject arbitrary SQL commands by manipulating the 'ID' parameter, potentially leading to unauthorized data access, data modification, or deletion within the backend database. The vulnerability does not require any user interaction or privileges, making it straightforward to exploit remotely over the network. The vendor was notified early but has not issued any patch or mitigation guidance, and public exploit code has been released, increasing the risk of active exploitation. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability affects only version 9.0 of Yonyou KSOA, a widely used enterprise resource planning (ERP) system, primarily deployed in business environments. The lack of patch availability and public exploit presence necessitate immediate defensive measures to prevent exploitation.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive business data, including financial records, employee information, and operational plans managed within Yonyou KSOA. Attackers could manipulate or delete critical data, causing operational disruptions and financial losses. The integrity of business processes relying on the ERP system could be compromised, potentially affecting supply chain management, human resources, and accounting functions. Confidentiality breaches could result in regulatory non-compliance under GDPR, leading to legal penalties and reputational damage. Availability impacts could arise if attackers execute destructive SQL commands or cause database corruption, leading to downtime. The presence of public exploits and lack of vendor response increase the likelihood of targeted attacks, especially against organizations with high-value data or strategic importance in Europe’s industrial and commercial sectors.
Mitigation Recommendations
1. Implement immediate input validation and sanitization on the 'ID' parameter in /worksheet/del_workplan.jsp to prevent SQL injection, using parameterized queries or prepared statements. 2. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting Yonyou KSOA endpoints. 3. Restrict network access to the affected application, limiting exposure to trusted internal networks or VPN users only. 4. Monitor application logs and network traffic for unusual or suspicious activity related to the vulnerable endpoint. 5. Conduct a thorough security audit of the entire Yonyou KSOA deployment to identify and remediate other potential injection points. 6. Engage with Yonyou or third-party security vendors for potential patches or workarounds and plan for an upgrade once a fix is available. 7. Educate IT and security teams on the risks and detection methods for SQL injection attacks specific to this product. 8. Consider database-level protections such as least privilege access and query execution restrictions to limit damage if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-17T18:15:54.301Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696ce69dd302b072d9cf67dc
Added to database: 1/18/2026, 1:56:45 PM
Last enriched: 1/25/2026, 7:48:52 PM
Last updated: 2/7/2026, 2:29:09 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.