Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1122: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2026-1122cvecve-2026-1122
Published: Sun Jan 18 2026 (01/18/2026, 14:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

A vulnerability was determined in Yonyou KSOA 9.0. This impacts an unknown function of the file /worksheet/work_info.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/25/2026, 19:49:09 UTC

Technical Analysis

CVE-2026-1122 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the /worksheet/work_info.jsp component. The vulnerability stems from inadequate input validation of the HTTP GET parameter 'ID', which can be manipulated by remote attackers to inject arbitrary SQL queries. This flaw allows attackers to execute unauthorized SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or disruption of service. The attack vector requires no authentication or user interaction, increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with partial impact on confidentiality, integrity, and availability. The vendor was notified but has not issued a patch or response, and no known exploits have been observed in the wild yet. Given the public disclosure, the risk of exploitation may increase over time. The vulnerability is particularly concerning for organizations relying on Yonyou KSOA 9.0 for critical business operations, as SQL injection can lead to data breaches or operational disruptions.

Potential Impact

For European organizations, exploitation of CVE-2026-1122 could result in unauthorized access to sensitive business data, alteration or deletion of records, and potential downtime of critical enterprise applications. This could lead to financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements for data protection. The medium severity rating reflects that while the vulnerability does not allow full system takeover, it can still compromise key aspects of data confidentiality and integrity. Organizations in sectors such as finance, manufacturing, and government using Yonyou KSOA 9.0 are at particular risk. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. Additionally, the remote and unauthenticated nature of the vulnerability means attackers can exploit it without insider access, broadening the threat landscape.

Mitigation Recommendations

1. Implement strict input validation and parameterized queries or prepared statements in the affected application code to prevent SQL injection. 2. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/work_info.jsp. 3. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 4. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 5. If possible, isolate the affected application component in a segmented network zone to reduce lateral movement risk. 6. Engage with Yonyou support channels regularly for updates or patches and consider alternative solutions if no vendor remediation is forthcoming. 7. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. 8. Educate developers and administrators about secure coding practices and the risks of SQL injection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T18:15:57.044Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696cea21d302b072d9d213f3

Added to database: 1/18/2026, 2:11:45 PM

Last enriched: 1/25/2026, 7:49:09 PM

Last updated: 2/7/2026, 7:30:18 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats