Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1131: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2026-1131cvecve-2026-1131
Published: Mon Jan 19 2026 (01/19/2026, 01:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

A vulnerability has been found in Yonyou KSOA 9.0. Impacted is an unknown function of the file /kmc/save_catalog.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument catalogid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:52:50 UTC

Technical Analysis

CVE-2026-1131 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, a widely used enterprise application platform. The flaw exists in the handling of the 'catalogid' parameter within the /kmc/save_catalog.jsp endpoint, which processes HTTP GET requests. Due to insufficient input validation and sanitization, attackers can inject arbitrary SQL commands remotely without requiring authentication or user interaction. This vulnerability allows attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been publicly disclosed, and although no active exploitation has been reported, the availability of exploit details increases the risk of attacks. The vendor was notified but has not issued any response or patch, leaving systems exposed. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no required privileges or user interaction. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the nature of the injection and the affected component. Organizations relying on Yonyou KSOA 9.0 should be aware of this risk and take immediate steps to mitigate exposure.

Potential Impact

The SQL injection vulnerability in Yonyou KSOA 9.0 can have significant consequences for organizations using this software. Successful exploitation could allow attackers to access sensitive corporate data stored in backend databases, modify or delete records, and potentially disrupt application functionality. This could lead to data breaches, loss of data integrity, and service outages, impacting business operations and reputation. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface and risk of automated attacks or exploitation by opportunistic threat actors. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential attacks. Organizations in sectors relying heavily on Yonyou KSOA, such as finance, manufacturing, and government in regions where the product is prevalent, face elevated risks. The impact extends beyond confidentiality to integrity and availability, potentially affecting compliance and operational continuity.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement immediate compensating controls. First, restrict external access to the /kmc/save_catalog.jsp endpoint via network segmentation, firewalls, or web application firewalls (WAFs) with rules to detect and block SQL injection patterns targeting the 'catalogid' parameter. Employ input validation and sanitization at the application or proxy level to filter malicious inputs. Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. Conduct thorough security assessments and penetration tests to identify exploitation attempts. If feasible, consider temporarily disabling or restricting the vulnerable functionality until a vendor patch is released. Engage with Yonyou support channels for updates and advocate for timely remediation. Additionally, maintain regular backups and ensure incident response plans are updated to handle potential data compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T07:13:46.491Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696d8bd9d302b072d91e2355

Added to database: 1/19/2026, 1:41:45 AM

Last enriched: 2/23/2026, 10:52:50 PM

Last updated: 3/26/2026, 4:39:29 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses