CVE-2026-1131: SQL Injection in Yonyou KSOA
A vulnerability has been found in Yonyou KSOA 9.0. Impacted is an unknown function of the file /kmc/save_catalog.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument catalogid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1131 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, a widely used enterprise application platform. The flaw exists in the handling of the 'catalogid' parameter within the /kmc/save_catalog.jsp endpoint, which processes HTTP GET requests. Due to insufficient input validation and sanitization, attackers can inject arbitrary SQL commands remotely without requiring authentication or user interaction. This vulnerability allows attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been publicly disclosed, and although no active exploitation has been reported, the availability of exploit details increases the risk of attacks. The vendor was notified but has not issued any response or patch, leaving systems exposed. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no required privileges or user interaction. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the nature of the injection and the affected component. Organizations relying on Yonyou KSOA 9.0 should be aware of this risk and take immediate steps to mitigate exposure.
Potential Impact
The SQL injection vulnerability in Yonyou KSOA 9.0 can have significant consequences for organizations using this software. Successful exploitation could allow attackers to access sensitive corporate data stored in backend databases, modify or delete records, and potentially disrupt application functionality. This could lead to data breaches, loss of data integrity, and service outages, impacting business operations and reputation. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface and risk of automated attacks or exploitation by opportunistic threat actors. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential attacks. Organizations in sectors relying heavily on Yonyou KSOA, such as finance, manufacturing, and government in regions where the product is prevalent, face elevated risks. The impact extends beyond confidentiality to integrity and availability, potentially affecting compliance and operational continuity.
Mitigation Recommendations
Given the absence of an official patch, organizations should implement immediate compensating controls. First, restrict external access to the /kmc/save_catalog.jsp endpoint via network segmentation, firewalls, or web application firewalls (WAFs) with rules to detect and block SQL injection patterns targeting the 'catalogid' parameter. Employ input validation and sanitization at the application or proxy level to filter malicious inputs. Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. Conduct thorough security assessments and penetration tests to identify exploitation attempts. If feasible, consider temporarily disabling or restricting the vulnerable functionality until a vendor patch is released. Engage with Yonyou support channels for updates and advocate for timely remediation. Additionally, maintain regular backups and ensure incident response plans are updated to handle potential data compromise scenarios.
Affected Countries
China, Singapore, Malaysia, Indonesia, Vietnam, Thailand, South Korea, Japan
CVE-2026-1131: SQL Injection in Yonyou KSOA
Description
A vulnerability has been found in Yonyou KSOA 9.0. Impacted is an unknown function of the file /kmc/save_catalog.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument catalogid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1131 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, a widely used enterprise application platform. The flaw exists in the handling of the 'catalogid' parameter within the /kmc/save_catalog.jsp endpoint, which processes HTTP GET requests. Due to insufficient input validation and sanitization, attackers can inject arbitrary SQL commands remotely without requiring authentication or user interaction. This vulnerability allows attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been publicly disclosed, and although no active exploitation has been reported, the availability of exploit details increases the risk of attacks. The vendor was notified but has not issued any response or patch, leaving systems exposed. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no required privileges or user interaction. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the nature of the injection and the affected component. Organizations relying on Yonyou KSOA 9.0 should be aware of this risk and take immediate steps to mitigate exposure.
Potential Impact
The SQL injection vulnerability in Yonyou KSOA 9.0 can have significant consequences for organizations using this software. Successful exploitation could allow attackers to access sensitive corporate data stored in backend databases, modify or delete records, and potentially disrupt application functionality. This could lead to data breaches, loss of data integrity, and service outages, impacting business operations and reputation. Since the vulnerability requires no authentication and can be exploited remotely, it increases the attack surface and risk of automated attacks or exploitation by opportunistic threat actors. The lack of vendor response and patch availability prolongs exposure, increasing the window for potential attacks. Organizations in sectors relying heavily on Yonyou KSOA, such as finance, manufacturing, and government in regions where the product is prevalent, face elevated risks. The impact extends beyond confidentiality to integrity and availability, potentially affecting compliance and operational continuity.
Mitigation Recommendations
Given the absence of an official patch, organizations should implement immediate compensating controls. First, restrict external access to the /kmc/save_catalog.jsp endpoint via network segmentation, firewalls, or web application firewalls (WAFs) with rules to detect and block SQL injection patterns targeting the 'catalogid' parameter. Employ input validation and sanitization at the application or proxy level to filter malicious inputs. Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. Conduct thorough security assessments and penetration tests to identify exploitation attempts. If feasible, consider temporarily disabling or restricting the vulnerable functionality until a vendor patch is released. Engage with Yonyou support channels for updates and advocate for timely remediation. Additionally, maintain regular backups and ensure incident response plans are updated to handle potential data compromise scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-18T07:13:46.491Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696d8bd9d302b072d91e2355
Added to database: 1/19/2026, 1:41:45 AM
Last enriched: 2/23/2026, 10:52:50 PM
Last updated: 3/26/2026, 4:39:29 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.