CVE-2026-1130: SQL Injection in Yonyou KSOA
CVE-2026-1130 is a medium-severity SQL injection vulnerability affecting Yonyou KSOA version 9. 0. The flaw exists in the HTTP GET parameter handler for the /worksheet/worksadd_plan. jsp endpoint, where manipulation of the 'ID' parameter allows remote attackers to execute arbitrary SQL commands without authentication or user interaction. Although no known exploits are currently active in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The vendor has not responded to disclosure attempts, and no patches are available yet. This vulnerability can lead to unauthorized data access, data modification, or denial of service. European organizations using Yonyou KSOA 9. 0, especially in countries with significant adoption of this ERP software, should prioritize mitigation efforts. Mitigations include implementing web application firewalls with SQL injection detection, restricting access to vulnerable endpoints, and monitoring for suspicious database queries.
AI Analysis
Technical Summary
CVE-2026-1130 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, specifically within the HTTP GET parameter handler for the /worksheet/worksadd_plan.jsp component. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, allowing an attacker to inject malicious SQL statements remotely without requiring authentication or user interaction. The flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data retrieval, data corruption, or disruption of service. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no active exploits have been observed in the wild, proof-of-concept exploit code has been published, increasing the likelihood of exploitation attempts. The vendor, Yonyou, has not responded to early disclosure notifications, and no official patches or mitigations have been released. This leaves affected systems exposed, especially in environments where Yonyou KSOA 9.0 is deployed without additional protective controls. The vulnerability is critical for organizations relying on this ERP platform for business operations, as it could lead to data breaches or operational disruptions if exploited.
Potential Impact
For European organizations, exploitation of CVE-2026-1130 could result in unauthorized access to sensitive business data, including financial records, planning documents, and operational workflows managed within Yonyou KSOA. The integrity of data could be compromised, leading to incorrect business decisions or financial losses. Availability impacts could arise if attackers execute destructive SQL commands or cause database errors, disrupting business continuity. Given the remote and unauthenticated nature of the attack, threat actors can exploit this vulnerability from anywhere, increasing the risk profile. European companies in manufacturing, logistics, and enterprise resource planning sectors that utilize Yonyou KSOA 9.0 are particularly vulnerable. The lack of vendor response and patches exacerbates the risk, potentially leading to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Additionally, the publication of exploit code raises the likelihood of opportunistic attacks targeting European enterprises, which may have strategic importance or valuable intellectual property stored within these systems.
Mitigation Recommendations
Since no official patches are currently available from Yonyou, European organizations should implement immediate compensating controls. Deploy web application firewalls (WAFs) with robust SQL injection detection and prevention rules tailored to monitor and block malicious payloads targeting the /worksheet/worksadd_plan.jsp endpoint and the 'ID' parameter. Restrict network access to the affected application components using IP whitelisting or VPNs to limit exposure to trusted users only. Conduct thorough input validation and sanitization at the application layer if possible, or use database parameterized queries to prevent injection. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. Regularly audit and review user privileges to minimize the impact of potential exploitation. Prepare incident response plans specific to SQL injection attacks and ensure backups are current and tested for rapid recovery. Engage with Yonyou support channels for updates and consider alternative ERP solutions if remediation is delayed. Finally, raise awareness among IT and security teams about this vulnerability to ensure vigilance.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Spain
CVE-2026-1130: SQL Injection in Yonyou KSOA
Description
CVE-2026-1130 is a medium-severity SQL injection vulnerability affecting Yonyou KSOA version 9. 0. The flaw exists in the HTTP GET parameter handler for the /worksheet/worksadd_plan. jsp endpoint, where manipulation of the 'ID' parameter allows remote attackers to execute arbitrary SQL commands without authentication or user interaction. Although no known exploits are currently active in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The vendor has not responded to disclosure attempts, and no patches are available yet. This vulnerability can lead to unauthorized data access, data modification, or denial of service. European organizations using Yonyou KSOA 9. 0, especially in countries with significant adoption of this ERP software, should prioritize mitigation efforts. Mitigations include implementing web application firewalls with SQL injection detection, restricting access to vulnerable endpoints, and monitoring for suspicious database queries.
AI-Powered Analysis
Technical Analysis
CVE-2026-1130 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, specifically within the HTTP GET parameter handler for the /worksheet/worksadd_plan.jsp component. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, allowing an attacker to inject malicious SQL statements remotely without requiring authentication or user interaction. The flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data retrieval, data corruption, or disruption of service. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no active exploits have been observed in the wild, proof-of-concept exploit code has been published, increasing the likelihood of exploitation attempts. The vendor, Yonyou, has not responded to early disclosure notifications, and no official patches or mitigations have been released. This leaves affected systems exposed, especially in environments where Yonyou KSOA 9.0 is deployed without additional protective controls. The vulnerability is critical for organizations relying on this ERP platform for business operations, as it could lead to data breaches or operational disruptions if exploited.
Potential Impact
For European organizations, exploitation of CVE-2026-1130 could result in unauthorized access to sensitive business data, including financial records, planning documents, and operational workflows managed within Yonyou KSOA. The integrity of data could be compromised, leading to incorrect business decisions or financial losses. Availability impacts could arise if attackers execute destructive SQL commands or cause database errors, disrupting business continuity. Given the remote and unauthenticated nature of the attack, threat actors can exploit this vulnerability from anywhere, increasing the risk profile. European companies in manufacturing, logistics, and enterprise resource planning sectors that utilize Yonyou KSOA 9.0 are particularly vulnerable. The lack of vendor response and patches exacerbates the risk, potentially leading to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Additionally, the publication of exploit code raises the likelihood of opportunistic attacks targeting European enterprises, which may have strategic importance or valuable intellectual property stored within these systems.
Mitigation Recommendations
Since no official patches are currently available from Yonyou, European organizations should implement immediate compensating controls. Deploy web application firewalls (WAFs) with robust SQL injection detection and prevention rules tailored to monitor and block malicious payloads targeting the /worksheet/worksadd_plan.jsp endpoint and the 'ID' parameter. Restrict network access to the affected application components using IP whitelisting or VPNs to limit exposure to trusted users only. Conduct thorough input validation and sanitization at the application layer if possible, or use database parameterized queries to prevent injection. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. Regularly audit and review user privileges to minimize the impact of potential exploitation. Prepare incident response plans specific to SQL injection attacks and ensure backups are current and tested for rapid recovery. Engage with Yonyou support channels for updates and consider alternative ERP solutions if remediation is delayed. Finally, raise awareness among IT and security teams about this vulnerability to ensure vigilance.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-18T07:13:43.597Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696d7dc9d302b072d910517a
Added to database: 1/19/2026, 12:41:45 AM
Last enriched: 1/26/2026, 8:05:52 PM
Last updated: 2/7/2026, 3:30:04 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.