Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1133: SQL Injection in Yonyou KSOA

0
Medium
VulnerabilityCVE-2026-1133cvecve-2026-1133
Published: Mon Jan 19 2026 (01/19/2026, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: KSOA

Description

A vulnerability was determined in Yonyou KSOA 9.0. The impacted element is an unknown function of the file /kmf/folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:53:21 UTC

Technical Analysis

CVE-2026-1133 is a SQL injection vulnerability identified in Yonyou KSOA version 9.0, specifically within the /kmf/folder.jsp component that processes the HTTP GET parameter folderid. This vulnerability arises from improper sanitization or validation of the folderid parameter, allowing an attacker to inject malicious SQL code into backend database queries. The injection flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to unauthenticated attackers over the network. Successful exploitation can lead to unauthorized access to sensitive data, modification or deletion of database records, and potential disruption of service, although the impact is assessed as limited in scope (partial confidentiality, integrity, and availability). The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity with network attack vector, low attack complexity, and no privileges or user interaction needed. Despite early notification, the vendor Yonyou has not issued a patch or official response, and public exploit information is available, increasing the risk of exploitation. The lack of vendor remediation necessitates that organizations using KSOA 9.0 implement alternative mitigations to reduce exposure. This vulnerability is particularly concerning for enterprises relying on Yonyou's KSOA platform for business operations, as it could be leveraged to compromise critical backend systems and data integrity.

Potential Impact

The impact of CVE-2026-1133 on organizations worldwide includes potential unauthorized access to sensitive database information, data tampering, and disruption of service availability within affected Yonyou KSOA 9.0 deployments. Since the vulnerability allows remote exploitation without authentication, attackers can leverage it to extract confidential data or corrupt business-critical information, undermining data integrity and confidentiality. The partial availability impact could result in denial or degradation of service, affecting business continuity. Organizations relying on Yonyou KSOA for enterprise resource planning or other critical functions may face operational disruptions and reputational damage. The absence of a vendor patch increases the window of exposure, raising the likelihood of exploitation attempts. Furthermore, attackers could use this vulnerability as a foothold for lateral movement within networks, escalating risks to broader IT infrastructure. The medium severity rating suggests a significant but not catastrophic impact, yet the ease of exploitation and lack of authentication requirements elevate the threat level for affected entities.

Mitigation Recommendations

Given the absence of an official patch from Yonyou, organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the folderid parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL injection payloads. Deploy WAF rules specifically tailored to detect and prevent SQL injection attempts targeting /kmf/folder.jsp requests. Limit network exposure of the KSOA application by restricting access to trusted IP addresses and segments through firewall policies. Conduct thorough logging and monitoring of web server and database activity to identify anomalous queries or repeated access attempts to the vulnerable endpoint. Employ database-level permissions to minimize the impact of any successful injection by restricting the application's database user privileges to the least necessary. Consider deploying runtime application self-protection (RASP) solutions if available. Additionally, organizations should engage with Yonyou support channels to demand timely patch releases and track any updates. Regular security assessments and penetration testing focusing on this vulnerability can help verify the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T07:13:54.296Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696d99ead302b072d92fe5e8

Added to database: 1/19/2026, 2:41:46 AM

Last enriched: 2/23/2026, 10:53:21 PM

Last updated: 3/23/2026, 3:46:49 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses