CVE-2026-1123: SQL Injection in Yonyou KSOA
A vulnerability was identified in Yonyou KSOA 9.0. Affected is an unknown function of the file /worksheet/work_mod.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1123 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the HTTP GET parameter handler in the /worksheet/work_mod.jsp component. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited by sending crafted HTTP GET requests to the vulnerable endpoint, enabling attackers to manipulate backend database queries. The consequences include unauthorized data retrieval, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of critical business data managed by the KSOA system. The CVSS 4.0 base score is 6.9, reflecting medium severity with network attack vector, low complexity, and no privileges or user interaction needed. The vendor was notified but has not responded, and no patches have been released, increasing the risk exposure. Public exploit code is available, which could facilitate exploitation by malicious actors. The vulnerability affects only version 9.0 of KSOA, a widely used enterprise resource planning (ERP) solution, primarily deployed in medium to large organizations. The lack of vendor response and patch availability necessitates immediate defensive measures to mitigate potential attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to enterprise systems relying on Yonyou KSOA 9.0. Successful exploitation could lead to unauthorized access to sensitive corporate data, including financial records, employee information, and operational details. Data integrity could be compromised through unauthorized modifications or deletions, disrupting business processes and causing financial losses. Availability may also be affected if attackers execute destructive SQL commands or cause database corruption. Given the remote and unauthenticated nature of the exploit, attackers can operate stealthily and at scale, increasing the threat surface. Organizations in sectors such as manufacturing, finance, and government using KSOA are particularly vulnerable. The absence of vendor patches means organizations must rely on compensating controls, increasing operational complexity and potential downtime. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed, potentially leading to fines under GDPR and other data protection laws.
Mitigation Recommendations
1. Deploy Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the /worksheet/work_mod.jsp endpoint and the 'ID' parameter. 2. Implement strict input validation and parameter sanitization at the application level, ensuring that only expected data types and formats are accepted for the 'ID' parameter. 3. Monitor database query logs and web server logs for unusual or suspicious activity indicative of SQL injection attempts, such as unexpected SQL syntax or error messages. 4. Restrict database user permissions associated with the KSOA application to the minimum necessary, preventing unauthorized data manipulation even if injection occurs. 5. Isolate the KSOA application environment from critical network segments to limit lateral movement in case of compromise. 6. Engage in active threat hunting and incident response readiness to quickly identify and remediate any exploitation attempts. 7. Maintain regular backups of critical data and verify their integrity to enable recovery in case of data corruption or deletion. 8. Contact Yonyou support channels persistently for updates or patches and consider alternative ERP solutions if remediation is delayed. 9. Educate IT and security teams about this specific vulnerability and the importance of rapid mitigation steps.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2026-1123: SQL Injection in Yonyou KSOA
Description
A vulnerability was identified in Yonyou KSOA 9.0. Affected is an unknown function of the file /worksheet/work_mod.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-1123 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the HTTP GET parameter handler in the /worksheet/work_mod.jsp component. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited by sending crafted HTTP GET requests to the vulnerable endpoint, enabling attackers to manipulate backend database queries. The consequences include unauthorized data retrieval, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of critical business data managed by the KSOA system. The CVSS 4.0 base score is 6.9, reflecting medium severity with network attack vector, low complexity, and no privileges or user interaction needed. The vendor was notified but has not responded, and no patches have been released, increasing the risk exposure. Public exploit code is available, which could facilitate exploitation by malicious actors. The vulnerability affects only version 9.0 of KSOA, a widely used enterprise resource planning (ERP) solution, primarily deployed in medium to large organizations. The lack of vendor response and patch availability necessitates immediate defensive measures to mitigate potential attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to enterprise systems relying on Yonyou KSOA 9.0. Successful exploitation could lead to unauthorized access to sensitive corporate data, including financial records, employee information, and operational details. Data integrity could be compromised through unauthorized modifications or deletions, disrupting business processes and causing financial losses. Availability may also be affected if attackers execute destructive SQL commands or cause database corruption. Given the remote and unauthenticated nature of the exploit, attackers can operate stealthily and at scale, increasing the threat surface. Organizations in sectors such as manufacturing, finance, and government using KSOA are particularly vulnerable. The absence of vendor patches means organizations must rely on compensating controls, increasing operational complexity and potential downtime. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed, potentially leading to fines under GDPR and other data protection laws.
Mitigation Recommendations
1. Deploy Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the /worksheet/work_mod.jsp endpoint and the 'ID' parameter. 2. Implement strict input validation and parameter sanitization at the application level, ensuring that only expected data types and formats are accepted for the 'ID' parameter. 3. Monitor database query logs and web server logs for unusual or suspicious activity indicative of SQL injection attempts, such as unexpected SQL syntax or error messages. 4. Restrict database user permissions associated with the KSOA application to the minimum necessary, preventing unauthorized data manipulation even if injection occurs. 5. Isolate the KSOA application environment from critical network segments to limit lateral movement in case of compromise. 6. Engage in active threat hunting and incident response readiness to quickly identify and remediate any exploitation attempts. 7. Maintain regular backups of critical data and verify their integrity to enable recovery in case of data corruption or deletion. 8. Contact Yonyou support channels persistently for updates or patches and consider alternative ERP solutions if remediation is delayed. 9. Educate IT and security teams about this specific vulnerability and the importance of rapid mitigation steps.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-17T18:15:59.885Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696cf831d302b072d9d9a04b
Added to database: 1/18/2026, 3:11:45 PM
Last enriched: 1/25/2026, 7:49:24 PM
Last updated: 2/7/2026, 11:20:58 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.