CVE-2026-1122: SQL Injection in Yonyou KSOA
A vulnerability was determined in Yonyou KSOA 9.0. This impacts an unknown function of the file /worksheet/work_info.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1122 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the /worksheet/work_info.jsp component. The vulnerability stems from inadequate input validation of the HTTP GET parameter 'ID', which can be manipulated by remote attackers to inject arbitrary SQL queries. This flaw allows attackers to execute unauthorized SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or disruption of service. The attack vector requires no authentication or user interaction, increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with partial impact on confidentiality, integrity, and availability. The vendor was notified but has not issued a patch or response, and no known exploits have been observed in the wild yet. Given the public disclosure, the risk of exploitation may increase over time. The vulnerability is particularly concerning for organizations relying on Yonyou KSOA 9.0 for critical business operations, as SQL injection can lead to data breaches or operational disruptions.
Potential Impact
For European organizations, exploitation of CVE-2026-1122 could result in unauthorized access to sensitive business data, alteration or deletion of records, and potential downtime of critical enterprise applications. This could lead to financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements for data protection. The medium severity rating reflects that while the vulnerability does not allow full system takeover, it can still compromise key aspects of data confidentiality and integrity. Organizations in sectors such as finance, manufacturing, and government using Yonyou KSOA 9.0 are at particular risk. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. Additionally, the remote and unauthenticated nature of the vulnerability means attackers can exploit it without insider access, broadening the threat landscape.
Mitigation Recommendations
1. Implement strict input validation and parameterized queries or prepared statements in the affected application code to prevent SQL injection. 2. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/work_info.jsp. 3. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 4. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 5. If possible, isolate the affected application component in a segmented network zone to reduce lateral movement risk. 6. Engage with Yonyou support channels regularly for updates or patches and consider alternative solutions if no vendor remediation is forthcoming. 7. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. 8. Educate developers and administrators about secure coding practices and the risks of SQL injection.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2026-1122: SQL Injection in Yonyou KSOA
Description
A vulnerability was determined in Yonyou KSOA 9.0. This impacts an unknown function of the file /worksheet/work_info.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-1122 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the /worksheet/work_info.jsp component. The vulnerability stems from inadequate input validation of the HTTP GET parameter 'ID', which can be manipulated by remote attackers to inject arbitrary SQL queries. This flaw allows attackers to execute unauthorized SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or disruption of service. The attack vector requires no authentication or user interaction, increasing the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with partial impact on confidentiality, integrity, and availability. The vendor was notified but has not issued a patch or response, and no known exploits have been observed in the wild yet. Given the public disclosure, the risk of exploitation may increase over time. The vulnerability is particularly concerning for organizations relying on Yonyou KSOA 9.0 for critical business operations, as SQL injection can lead to data breaches or operational disruptions.
Potential Impact
For European organizations, exploitation of CVE-2026-1122 could result in unauthorized access to sensitive business data, alteration or deletion of records, and potential downtime of critical enterprise applications. This could lead to financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements for data protection. The medium severity rating reflects that while the vulnerability does not allow full system takeover, it can still compromise key aspects of data confidentiality and integrity. Organizations in sectors such as finance, manufacturing, and government using Yonyou KSOA 9.0 are at particular risk. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. Additionally, the remote and unauthenticated nature of the vulnerability means attackers can exploit it without insider access, broadening the threat landscape.
Mitigation Recommendations
1. Implement strict input validation and parameterized queries or prepared statements in the affected application code to prevent SQL injection. 2. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/work_info.jsp. 3. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 4. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 5. If possible, isolate the affected application component in a segmented network zone to reduce lateral movement risk. 6. Engage with Yonyou support channels regularly for updates or patches and consider alternative solutions if no vendor remediation is forthcoming. 7. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. 8. Educate developers and administrators about secure coding practices and the risks of SQL injection.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-17T18:15:57.044Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696cea21d302b072d9d213f3
Added to database: 1/18/2026, 2:11:45 PM
Last enriched: 1/25/2026, 7:49:09 PM
Last updated: 2/7/2026, 10:42:19 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.