Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1129: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2026-1129cvecve-2026-1129
Published: Mon Jan 19 2026 (01/19/2026, 00:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

CVE-2026-1129 is a medium severity SQL injection vulnerability in Yonyou KSOA version 9. 0, specifically in the /worksheet/worksadd. jsp HTTP GET parameter handler. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing remote attackers to execute arbitrary SQL commands without authentication or user interaction. Although the exploit code is publicly available, no known active exploitation has been reported. The vendor has not responded to disclosure attempts, and no official patch is currently available. This vulnerability could lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of affected systems. European organizations using Yonyou KSOA 9. 0, particularly in countries with significant adoption of this software, should prioritize mitigation to prevent potential exploitation. Immediate actions include implementing web application firewalls with custom rules, monitoring for suspicious database queries, and restricting access to the vulnerable endpoint.

AI-Powered Analysis

AILast updated: 01/19/2026, 00:56:21 UTC

Technical Analysis

CVE-2026-1129 identifies a SQL injection vulnerability in Yonyou KSOA version 9.0, specifically within the HTTP GET parameter handler of the /worksheet/worksadd.jsp file. The vulnerability is caused by insufficient input validation and sanitization of the 'ID' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or deletion, and could also facilitate further attacks such as privilege escalation or lateral movement within the network. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the ease of exploitation (network accessible, no privileges or user interaction needed) but limited impact scope due to partial confidentiality, integrity, and availability impact. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported to date. The vendor, Yonyou, has not responded to vulnerability disclosure requests and has not released a patch, leaving organizations reliant on mitigation strategies. Yonyou KSOA is an enterprise application platform widely used in China and among organizations with Chinese business ties, which may influence the geographic impact and threat actor interest. The vulnerability's exploitation could compromise sensitive business data and disrupt operations, emphasizing the need for immediate defensive measures.

Potential Impact

For European organizations using Yonyou KSOA 9.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of critical business data. Exploitation could lead to unauthorized access to sensitive information, including financial records, employee data, or intellectual property, potentially resulting in data breaches and regulatory non-compliance under GDPR. Data manipulation or deletion could disrupt business processes, causing operational downtime and financial losses. The lack of authentication and user interaction requirements makes exploitation feasible by remote attackers, increasing the threat landscape. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks or targeted campaigns against organizations relying on this software. European entities with supply chain or business dependencies involving Chinese partners may face increased exposure. The absence of an official patch necessitates reliance on compensating controls, which may not fully eliminate risk. Overall, the vulnerability could undermine trust, cause reputational damage, and incur remediation costs for affected organizations.

Mitigation Recommendations

Given the absence of an official patch from Yonyou, European organizations should implement layered mitigation strategies. First, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'ID' parameter in /worksheet/worksadd.jsp. Conduct thorough input validation and sanitization at the application level if source code access is available, or implement reverse proxy filtering to sanitize inputs. Restrict network access to the vulnerable endpoint by limiting exposure to trusted IP ranges and enforcing strict access controls. Monitor database logs and application logs for anomalous queries or error messages indicative of injection attempts. Employ database activity monitoring tools to detect suspicious behavior in real time. Conduct regular security assessments and penetration testing focused on injection vulnerabilities. Educate IT and security teams about this specific threat to enhance detection and response capabilities. Prepare incident response plans tailored to SQL injection exploitation scenarios. Engage with Yonyou or third-party security vendors for potential patches or workarounds and track vulnerability disclosures for updates. Consider isolating or segmenting systems running Yonyou KSOA to minimize lateral movement risk if compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T07:13:36.202Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696d7dc9d302b072d9105174

Added to database: 1/19/2026, 12:41:45 AM

Last enriched: 1/19/2026, 12:56:21 AM

Last updated: 1/19/2026, 3:27:53 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats