CVE-2026-1129: SQL Injection in Yonyou KSOA
CVE-2026-1129 is a medium severity SQL injection vulnerability in Yonyou KSOA version 9. 0, specifically in the /worksheet/worksadd. jsp HTTP GET parameter handler. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing remote attackers to execute arbitrary SQL commands without authentication or user interaction. Although the exploit code is publicly available, no known active exploitation has been reported. The vendor has not responded to disclosure attempts, and no official patch is currently available. This vulnerability could lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of affected systems. European organizations using Yonyou KSOA 9. 0, particularly in countries with significant adoption of this software, should prioritize mitigation to prevent potential exploitation. Immediate actions include implementing web application firewalls with custom rules, monitoring for suspicious database queries, and restricting access to the vulnerable endpoint.
AI Analysis
Technical Summary
CVE-2026-1129 identifies a SQL injection vulnerability in Yonyou KSOA version 9.0, specifically within the HTTP GET parameter handler of the /worksheet/worksadd.jsp file. The vulnerability is caused by insufficient input validation and sanitization of the 'ID' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or deletion, and could also facilitate further attacks such as privilege escalation or lateral movement within the network. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the ease of exploitation (network accessible, no privileges or user interaction needed) but limited impact scope due to partial confidentiality, integrity, and availability impact. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported to date. The vendor, Yonyou, has not responded to vulnerability disclosure requests and has not released a patch, leaving organizations reliant on mitigation strategies. Yonyou KSOA is an enterprise application platform widely used in China and among organizations with Chinese business ties, which may influence the geographic impact and threat actor interest. The vulnerability's exploitation could compromise sensitive business data and disrupt operations, emphasizing the need for immediate defensive measures.
Potential Impact
For European organizations using Yonyou KSOA 9.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of critical business data. Exploitation could lead to unauthorized access to sensitive information, including financial records, employee data, or intellectual property, potentially resulting in data breaches and regulatory non-compliance under GDPR. Data manipulation or deletion could disrupt business processes, causing operational downtime and financial losses. The lack of authentication and user interaction requirements makes exploitation feasible by remote attackers, increasing the threat landscape. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks or targeted campaigns against organizations relying on this software. European entities with supply chain or business dependencies involving Chinese partners may face increased exposure. The absence of an official patch necessitates reliance on compensating controls, which may not fully eliminate risk. Overall, the vulnerability could undermine trust, cause reputational damage, and incur remediation costs for affected organizations.
Mitigation Recommendations
Given the absence of an official patch from Yonyou, European organizations should implement layered mitigation strategies. First, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/worksadd.jsp. Conduct thorough input validation and sanitization at the application level if source code access is available, or implement reverse proxy filtering to sanitize inputs. Restrict network access to the vulnerable endpoint by limiting exposure to trusted IP ranges and enforcing strict access controls. Monitor database logs and application logs for anomalous queries or error messages indicative of injection attempts. Employ database activity monitoring tools to detect suspicious behavior in real time. Conduct regular security assessments and penetration testing focused on injection vulnerabilities. Educate IT and security teams about this specific threat to enhance detection and response capabilities. Prepare incident response plans tailored to SQL injection exploitation scenarios. Engage with Yonyou or third-party security vendors for potential patches or workarounds and track vulnerability disclosures for updates. Consider isolating or segmenting systems running Yonyou KSOA to minimize lateral movement risk if compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2026-1129: SQL Injection in Yonyou KSOA
Description
CVE-2026-1129 is a medium severity SQL injection vulnerability in Yonyou KSOA version 9. 0, specifically in the /worksheet/worksadd. jsp HTTP GET parameter handler. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing remote attackers to execute arbitrary SQL commands without authentication or user interaction. Although the exploit code is publicly available, no known active exploitation has been reported. The vendor has not responded to disclosure attempts, and no official patch is currently available. This vulnerability could lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of affected systems. European organizations using Yonyou KSOA 9. 0, particularly in countries with significant adoption of this software, should prioritize mitigation to prevent potential exploitation. Immediate actions include implementing web application firewalls with custom rules, monitoring for suspicious database queries, and restricting access to the vulnerable endpoint.
AI-Powered Analysis
Technical Analysis
CVE-2026-1129 identifies a SQL injection vulnerability in Yonyou KSOA version 9.0, specifically within the HTTP GET parameter handler of the /worksheet/worksadd.jsp file. The vulnerability is caused by insufficient input validation and sanitization of the 'ID' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or deletion, and could also facilitate further attacks such as privilege escalation or lateral movement within the network. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the ease of exploitation (network accessible, no privileges or user interaction needed) but limited impact scope due to partial confidentiality, integrity, and availability impact. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported to date. The vendor, Yonyou, has not responded to vulnerability disclosure requests and has not released a patch, leaving organizations reliant on mitigation strategies. Yonyou KSOA is an enterprise application platform widely used in China and among organizations with Chinese business ties, which may influence the geographic impact and threat actor interest. The vulnerability's exploitation could compromise sensitive business data and disrupt operations, emphasizing the need for immediate defensive measures.
Potential Impact
For European organizations using Yonyou KSOA 9.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of critical business data. Exploitation could lead to unauthorized access to sensitive information, including financial records, employee data, or intellectual property, potentially resulting in data breaches and regulatory non-compliance under GDPR. Data manipulation or deletion could disrupt business processes, causing operational downtime and financial losses. The lack of authentication and user interaction requirements makes exploitation feasible by remote attackers, increasing the threat landscape. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks or targeted campaigns against organizations relying on this software. European entities with supply chain or business dependencies involving Chinese partners may face increased exposure. The absence of an official patch necessitates reliance on compensating controls, which may not fully eliminate risk. Overall, the vulnerability could undermine trust, cause reputational damage, and incur remediation costs for affected organizations.
Mitigation Recommendations
Given the absence of an official patch from Yonyou, European organizations should implement layered mitigation strategies. First, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/worksadd.jsp. Conduct thorough input validation and sanitization at the application level if source code access is available, or implement reverse proxy filtering to sanitize inputs. Restrict network access to the vulnerable endpoint by limiting exposure to trusted IP ranges and enforcing strict access controls. Monitor database logs and application logs for anomalous queries or error messages indicative of injection attempts. Employ database activity monitoring tools to detect suspicious behavior in real time. Conduct regular security assessments and penetration testing focused on injection vulnerabilities. Educate IT and security teams about this specific threat to enhance detection and response capabilities. Prepare incident response plans tailored to SQL injection exploitation scenarios. Engage with Yonyou or third-party security vendors for potential patches or workarounds and track vulnerability disclosures for updates. Consider isolating or segmenting systems running Yonyou KSOA to minimize lateral movement risk if compromised.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-18T07:13:36.202Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696d7dc9d302b072d9105174
Added to database: 1/19/2026, 12:41:45 AM
Last enriched: 1/19/2026, 12:56:21 AM
Last updated: 1/19/2026, 3:27:53 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1135: Cross Site Scripting in itsourcecode Society Management System
MediumCVE-2026-1134: Cross Site Scripting in itsourcecode Society Management System
MediumCVE-2026-0943: CWE-1395 Dependency on Vulnerable Third-Party Component in JV HarfBuzz::Shaper
UnknownCVE-2026-1133: SQL Injection in Yonyou KSOA
MediumCVE-2026-1132: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.