Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1130: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2026-1130cvecve-2026-1130
Published: Mon Jan 19 2026 (01/19/2026, 00:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

CVE-2026-1130 is a medium-severity SQL injection vulnerability found in Yonyou KSOA version 9. 0, specifically in the HTTP GET parameter handler for the /worksheet/worksadd_plan. jsp file. The vulnerability allows remote attackers to manipulate the 'ID' parameter to execute arbitrary SQL commands without authentication or user interaction. Although no patches have been released and the vendor has not responded, public exploit code exists, increasing the risk of exploitation. This flaw can lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of affected systems. European organizations using Yonyou KSOA 9. 0, especially in sectors relying on this software, face potential data breaches and operational disruptions. Mitigation requires immediate risk assessment, network-level filtering of suspicious requests, and monitoring for exploitation attempts. Countries with significant adoption of Yonyou products and critical infrastructure integration, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/19/2026, 00:56:07 UTC

Technical Analysis

CVE-2026-1130 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the HTTP GET parameter handler in the /worksheet/worksadd_plan.jsp component. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing attackers to inject malicious SQL queries remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with an attack vector of network (remote), low attack complexity, and no privileges or user interaction needed. The vendor has not issued a patch or responded to disclosure attempts, but exploit code has been published publicly, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability, as attackers can access sensitive data or disrupt services. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in exposed environments. Yonyou KSOA is an enterprise application platform widely used in Asia and increasingly adopted by multinational companies, including some European organizations, especially in sectors such as manufacturing, finance, and government services.

Potential Impact

For European organizations, exploitation of CVE-2026-1130 could lead to significant data breaches, exposing sensitive corporate or customer information. The integrity of business-critical data could be compromised, resulting in erroneous data processing or financial loss. Availability of services relying on Yonyou KSOA could be disrupted by malicious SQL commands, causing operational downtime. Organizations in regulated industries such as finance, healthcare, and government may face compliance violations and reputational damage. The public availability of exploit code increases the likelihood of automated attacks targeting vulnerable systems. Since the vulnerability requires no authentication, any externally accessible instance of Yonyou KSOA 9.0 is at risk. The absence of vendor patches exacerbates the threat, forcing organizations to rely on compensating controls. Attackers could leverage this vulnerability as a foothold for further network compromise or lateral movement within corporate environments.

Mitigation Recommendations

1. Immediately conduct an inventory to identify all instances of Yonyou KSOA 9.0 within the network. 2. Restrict external access to the /worksheet/worksadd_plan.jsp endpoint using network-level controls such as firewalls or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3. Implement strict input validation and sanitization at the application layer if source code or configuration access is available. 4. Monitor logs and network traffic for unusual database queries or repeated access attempts to the vulnerable endpoint. 5. Employ database activity monitoring tools to detect and alert on suspicious SQL commands. 6. Isolate vulnerable systems from critical infrastructure until a vendor patch or official remediation is available. 7. Engage with Yonyou support channels persistently to obtain official patches or guidance. 8. Consider deploying virtual patching via WAFs as an interim protective measure. 9. Educate incident response teams on the specific indicators of compromise related to this vulnerability. 10. Plan for rapid incident response and forensic analysis in case of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T07:13:43.597Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696d7dc9d302b072d910517a

Added to database: 1/19/2026, 12:41:45 AM

Last enriched: 1/19/2026, 12:56:07 AM

Last updated: 1/19/2026, 3:45:41 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats