CVE-2026-1177: SQL Injection in Yonyou KSOA
CVE-2026-1177 is a SQL Injection vulnerability found in Yonyou KSOA version 9. 0, specifically in the /kmf/save_folder. jsp file via the folderid HTTP GET parameter. This flaw allows remote attackers to manipulate SQL queries without authentication or user interaction, potentially leading to data leakage or modification. The vulnerability has a CVSS 4. 0 score of 6. 9 (medium severity) and public exploit code is available, though no active exploitation has been reported. The vendor has not responded to disclosure attempts, and no patches are currently available. European organizations using Yonyou KSOA 9. 0 are at risk, especially those in countries with significant adoption of Yonyou products.
AI Analysis
Technical Summary
CVE-2026-1177 is a SQL Injection vulnerability identified in Yonyou KSOA version 9.0, affecting the /kmf/save_folder.jsp endpoint. The vulnerability arises from improper sanitization of the folderid parameter in HTTP GET requests, allowing an attacker to inject malicious SQL code. This injection can be performed remotely without requiring authentication or user interaction, increasing the attack surface significantly. The flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even full compromise of the database server. The vulnerability has been assigned a CVSS 4.0 score of 6.9, reflecting a medium severity level due to its network attack vector, lack of required privileges, and no user interaction needed, but with limited impact on confidentiality, integrity, and availability. Public exploit code has been released, increasing the risk of exploitation despite no confirmed active attacks in the wild. The vendor Yonyou has not issued any patches or advisories, leaving users exposed. The lack of vendor response complicates remediation efforts, emphasizing the need for defensive controls. The vulnerability is particularly concerning for organizations relying on Yonyou KSOA 9.0 for critical business operations, as SQL Injection remains a high-risk vector for data breaches and system compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive business data managed through Yonyou KSOA 9.0. Successful exploitation could lead to unauthorized data disclosure, data tampering, or disruption of business processes relying on the affected system. Given the remote and unauthenticated nature of the attack, threat actors could leverage this flaw to gain initial access or escalate privileges within corporate networks. This is particularly critical for sectors handling sensitive or regulated data, such as finance, healthcare, and government agencies. The absence of vendor patches increases the window of exposure, potentially inviting opportunistic attackers or advanced persistent threats to exploit the vulnerability. Additionally, the public availability of exploit code lowers the barrier for attackers, increasing the likelihood of exploitation attempts. The impact extends beyond data loss to potential reputational damage and regulatory penalties under frameworks like GDPR if personal data is compromised.
Mitigation Recommendations
1. Implement strict input validation and sanitization on the folderid parameter at the application level to prevent SQL injection payloads. 2. Deploy a Web Application Firewall (WAF) with custom rules to detect and block SQL injection attempts targeting the /kmf/save_folder.jsp endpoint. 3. Restrict network access to the affected application to trusted IP ranges and enforce segmentation to limit lateral movement if compromised. 4. Monitor application logs and network traffic for anomalous queries or patterns indicative of SQL injection exploitation. 5. Conduct regular security assessments and penetration testing focused on injection flaws in Yonyou KSOA deployments. 6. Engage with Yonyou support channels persistently to request official patches or mitigations. 7. Consider temporary compensating controls such as disabling or restricting access to the vulnerable functionality if feasible. 8. Educate internal security teams about this specific vulnerability and ensure incident response plans include scenarios involving SQL injection attacks on Yonyou products.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2026-1177: SQL Injection in Yonyou KSOA
Description
CVE-2026-1177 is a SQL Injection vulnerability found in Yonyou KSOA version 9. 0, specifically in the /kmf/save_folder. jsp file via the folderid HTTP GET parameter. This flaw allows remote attackers to manipulate SQL queries without authentication or user interaction, potentially leading to data leakage or modification. The vulnerability has a CVSS 4. 0 score of 6. 9 (medium severity) and public exploit code is available, though no active exploitation has been reported. The vendor has not responded to disclosure attempts, and no patches are currently available. European organizations using Yonyou KSOA 9. 0 are at risk, especially those in countries with significant adoption of Yonyou products.
AI-Powered Analysis
Technical Analysis
CVE-2026-1177 is a SQL Injection vulnerability identified in Yonyou KSOA version 9.0, affecting the /kmf/save_folder.jsp endpoint. The vulnerability arises from improper sanitization of the folderid parameter in HTTP GET requests, allowing an attacker to inject malicious SQL code. This injection can be performed remotely without requiring authentication or user interaction, increasing the attack surface significantly. The flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even full compromise of the database server. The vulnerability has been assigned a CVSS 4.0 score of 6.9, reflecting a medium severity level due to its network attack vector, lack of required privileges, and no user interaction needed, but with limited impact on confidentiality, integrity, and availability. Public exploit code has been released, increasing the risk of exploitation despite no confirmed active attacks in the wild. The vendor Yonyou has not issued any patches or advisories, leaving users exposed. The lack of vendor response complicates remediation efforts, emphasizing the need for defensive controls. The vulnerability is particularly concerning for organizations relying on Yonyou KSOA 9.0 for critical business operations, as SQL Injection remains a high-risk vector for data breaches and system compromise.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive business data managed through Yonyou KSOA 9.0. Successful exploitation could lead to unauthorized data disclosure, data tampering, or disruption of business processes relying on the affected system. Given the remote and unauthenticated nature of the attack, threat actors could leverage this flaw to gain initial access or escalate privileges within corporate networks. This is particularly critical for sectors handling sensitive or regulated data, such as finance, healthcare, and government agencies. The absence of vendor patches increases the window of exposure, potentially inviting opportunistic attackers or advanced persistent threats to exploit the vulnerability. Additionally, the public availability of exploit code lowers the barrier for attackers, increasing the likelihood of exploitation attempts. The impact extends beyond data loss to potential reputational damage and regulatory penalties under frameworks like GDPR if personal data is compromised.
Mitigation Recommendations
1. Implement strict input validation and sanitization on the folderid parameter at the application level to prevent SQL injection payloads. 2. Deploy a Web Application Firewall (WAF) with custom rules to detect and block SQL injection attempts targeting the /kmf/save_folder.jsp endpoint. 3. Restrict network access to the affected application to trusted IP ranges and enforce segmentation to limit lateral movement if compromised. 4. Monitor application logs and network traffic for anomalous queries or patterns indicative of SQL injection exploitation. 5. Conduct regular security assessments and penetration testing focused on injection flaws in Yonyou KSOA deployments. 6. Engage with Yonyou support channels persistently to request official patches or mitigations. 7. Consider temporary compensating controls such as disabling or restricting access to the vulnerable functionality if feasible. 8. Educate internal security teams about this specific vulnerability and ensure incident response plans include scenarios involving SQL injection attacks on Yonyou products.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-19T07:33:45.859Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696ea73f4623b1157cd0166e
Added to database: 1/19/2026, 9:50:55 PM
Last enriched: 1/19/2026, 10:05:15 PM
Last updated: 1/19/2026, 10:57:10 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1179: SQL Injection in Yonyou KSOA
MediumCVE-2026-23944: CWE-306: Missing Authentication for Critical Function in getarcaneapp arcane
HighCVE-2026-23885: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AlchemyCMS alchemy_cms
MediumCVE-2026-23880: CWE-20: Improper Input Validation in HackUCF OnboardLite
HighCVE-2026-23877: CWE-25: Path Traversal: '/../filedir' in swingmx swingmusic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.