CVE-2026-1130: SQL Injection in Yonyou KSOA
CVE-2026-1130 is a medium-severity SQL injection vulnerability found in Yonyou KSOA version 9. 0, specifically in the HTTP GET parameter handler for the /worksheet/worksadd_plan. jsp file. The vulnerability allows remote attackers to manipulate the 'ID' parameter to execute arbitrary SQL commands without authentication or user interaction. Although no patches have been released and the vendor has not responded, public exploit code exists, increasing the risk of exploitation. This flaw can lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of affected systems. European organizations using Yonyou KSOA 9. 0, especially in sectors relying on this software, face potential data breaches and operational disruptions. Mitigation requires immediate risk assessment, network-level filtering of suspicious requests, and monitoring for exploitation attempts. Countries with significant adoption of Yonyou products and critical infrastructure integration, such as Germany, France, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2026-1130 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the HTTP GET parameter handler in the /worksheet/worksadd_plan.jsp component. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing attackers to inject malicious SQL queries remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with an attack vector of network (remote), low attack complexity, and no privileges or user interaction needed. The vendor has not issued a patch or responded to disclosure attempts, but exploit code has been published publicly, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability, as attackers can access sensitive data or disrupt services. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in exposed environments. Yonyou KSOA is an enterprise application platform widely used in Asia and increasingly adopted by multinational companies, including some European organizations, especially in sectors such as manufacturing, finance, and government services.
Potential Impact
For European organizations, exploitation of CVE-2026-1130 could lead to significant data breaches, exposing sensitive corporate or customer information. The integrity of business-critical data could be compromised, resulting in erroneous data processing or financial loss. Availability of services relying on Yonyou KSOA could be disrupted by malicious SQL commands, causing operational downtime. Organizations in regulated industries such as finance, healthcare, and government may face compliance violations and reputational damage. The public availability of exploit code increases the likelihood of automated attacks targeting vulnerable systems. Since the vulnerability requires no authentication, any externally accessible instance of Yonyou KSOA 9.0 is at risk. The absence of vendor patches exacerbates the threat, forcing organizations to rely on compensating controls. Attackers could leverage this vulnerability as a foothold for further network compromise or lateral movement within corporate environments.
Mitigation Recommendations
1. Immediately conduct an inventory to identify all instances of Yonyou KSOA 9.0 within the network. 2. Restrict external access to the /worksheet/worksadd_plan.jsp endpoint using network-level controls such as firewalls or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3. Implement strict input validation and sanitization at the application layer if source code or configuration access is available. 4. Monitor logs and network traffic for unusual database queries or repeated access attempts to the vulnerable endpoint. 5. Employ database activity monitoring tools to detect and alert on suspicious SQL commands. 6. Isolate vulnerable systems from critical infrastructure until a vendor patch or official remediation is available. 7. Engage with Yonyou support channels persistently to obtain official patches or guidance. 8. Consider deploying virtual patching via WAFs as an interim protective measure. 9. Educate incident response teams on the specific indicators of compromise related to this vulnerability. 10. Plan for rapid incident response and forensic analysis in case of exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2026-1130: SQL Injection in Yonyou KSOA
Description
CVE-2026-1130 is a medium-severity SQL injection vulnerability found in Yonyou KSOA version 9. 0, specifically in the HTTP GET parameter handler for the /worksheet/worksadd_plan. jsp file. The vulnerability allows remote attackers to manipulate the 'ID' parameter to execute arbitrary SQL commands without authentication or user interaction. Although no patches have been released and the vendor has not responded, public exploit code exists, increasing the risk of exploitation. This flaw can lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of affected systems. European organizations using Yonyou KSOA 9. 0, especially in sectors relying on this software, face potential data breaches and operational disruptions. Mitigation requires immediate risk assessment, network-level filtering of suspicious requests, and monitoring for exploitation attempts. Countries with significant adoption of Yonyou products and critical infrastructure integration, such as Germany, France, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-1130 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, affecting the HTTP GET parameter handler in the /worksheet/worksadd_plan.jsp component. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing attackers to inject malicious SQL queries remotely without requiring authentication or user interaction. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with an attack vector of network (remote), low attack complexity, and no privileges or user interaction needed. The vendor has not issued a patch or responded to disclosure attempts, but exploit code has been published publicly, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability, as attackers can access sensitive data or disrupt services. The lack of authentication and user interaction requirements makes this vulnerability particularly dangerous in exposed environments. Yonyou KSOA is an enterprise application platform widely used in Asia and increasingly adopted by multinational companies, including some European organizations, especially in sectors such as manufacturing, finance, and government services.
Potential Impact
For European organizations, exploitation of CVE-2026-1130 could lead to significant data breaches, exposing sensitive corporate or customer information. The integrity of business-critical data could be compromised, resulting in erroneous data processing or financial loss. Availability of services relying on Yonyou KSOA could be disrupted by malicious SQL commands, causing operational downtime. Organizations in regulated industries such as finance, healthcare, and government may face compliance violations and reputational damage. The public availability of exploit code increases the likelihood of automated attacks targeting vulnerable systems. Since the vulnerability requires no authentication, any externally accessible instance of Yonyou KSOA 9.0 is at risk. The absence of vendor patches exacerbates the threat, forcing organizations to rely on compensating controls. Attackers could leverage this vulnerability as a foothold for further network compromise or lateral movement within corporate environments.
Mitigation Recommendations
1. Immediately conduct an inventory to identify all instances of Yonyou KSOA 9.0 within the network. 2. Restrict external access to the /worksheet/worksadd_plan.jsp endpoint using network-level controls such as firewalls or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3. Implement strict input validation and sanitization at the application layer if source code or configuration access is available. 4. Monitor logs and network traffic for unusual database queries or repeated access attempts to the vulnerable endpoint. 5. Employ database activity monitoring tools to detect and alert on suspicious SQL commands. 6. Isolate vulnerable systems from critical infrastructure until a vendor patch or official remediation is available. 7. Engage with Yonyou support channels persistently to obtain official patches or guidance. 8. Consider deploying virtual patching via WAFs as an interim protective measure. 9. Educate incident response teams on the specific indicators of compromise related to this vulnerability. 10. Plan for rapid incident response and forensic analysis in case of exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-18T07:13:43.597Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696d7dc9d302b072d910517a
Added to database: 1/19/2026, 12:41:45 AM
Last enriched: 1/19/2026, 12:56:07 AM
Last updated: 1/19/2026, 3:45:41 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1135: Cross Site Scripting in itsourcecode Society Management System
MediumCVE-2026-1134: Cross Site Scripting in itsourcecode Society Management System
MediumCVE-2026-0943: CWE-1395 Dependency on Vulnerable Third-Party Component in JV HarfBuzz::Shaper
MediumCVE-2026-1133: SQL Injection in Yonyou KSOA
MediumCVE-2026-1132: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.