CVE-2026-1177: SQL Injection in Yonyou KSOA
A weakness has been identified in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /kmf/save_folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1177 identifies a SQL injection vulnerability in Yonyou KSOA version 9.0, specifically within the /kmf/save_folder.jsp file's HTTP GET parameter handler for 'folderid'. This vulnerability arises due to insufficient input validation or improper sanitization of the 'folderid' parameter, allowing an attacker to inject malicious SQL code into backend database queries. The attack vector is remote and requires no authentication or user interaction, making it highly accessible to threat actors. Exploiting this flaw can lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality, integrity, and availability of the affected system's data. The vendor has not responded to vulnerability reports and has not released patches, while exploit code has been publicly disclosed, increasing the risk of exploitation. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the vulnerability's network attack vector, lack of required privileges, and no user interaction, but with limited scope and impact. The vulnerability affects a critical component of Yonyou KSOA, a widely used enterprise service bus and middleware platform, which is integral to many business processes. Without remediation, attackers could leverage this flaw to gain unauthorized access to sensitive business data or disrupt operations.
Potential Impact
For European organizations, the exploitation of CVE-2026-1177 could result in significant data breaches, unauthorized data manipulation, and potential service disruptions. Given Yonyou KSOA's role in enterprise middleware, compromised systems could lead to cascading failures in interconnected applications, affecting business continuity. Confidential business information, customer data, and internal communications could be exposed or altered, leading to regulatory non-compliance under GDPR and other data protection laws. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against organizations slow to patch or implement mitigations. Operational disruptions could impact sectors such as finance, manufacturing, and public services that rely on Yonyou KSOA for integration and workflow automation. Additionally, the lack of vendor response complicates remediation efforts, potentially prolonging exposure and increasing risk.
Mitigation Recommendations
Organizations should immediately implement strict input validation and sanitization for the 'folderid' parameter within the /kmf/save_folder.jsp endpoint, ideally employing parameterized queries or prepared statements to prevent SQL injection. In the absence of an official patch, deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting this parameter is critical. Network segmentation should be enforced to limit access to the vulnerable service, restricting it to trusted internal networks where possible. Continuous monitoring and logging of database queries and web server access logs should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should also conduct thorough audits of their Yonyou KSOA deployments to identify and isolate vulnerable instances. Engaging with cybersecurity vendors for virtual patching solutions and threat intelligence updates is advisable. Finally, organizations must prepare incident response plans specific to SQL injection attacks to minimize impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2026-1177: SQL Injection in Yonyou KSOA
Description
A weakness has been identified in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /kmf/save_folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-1177 identifies a SQL injection vulnerability in Yonyou KSOA version 9.0, specifically within the /kmf/save_folder.jsp file's HTTP GET parameter handler for 'folderid'. This vulnerability arises due to insufficient input validation or improper sanitization of the 'folderid' parameter, allowing an attacker to inject malicious SQL code into backend database queries. The attack vector is remote and requires no authentication or user interaction, making it highly accessible to threat actors. Exploiting this flaw can lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality, integrity, and availability of the affected system's data. The vendor has not responded to vulnerability reports and has not released patches, while exploit code has been publicly disclosed, increasing the risk of exploitation. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the vulnerability's network attack vector, lack of required privileges, and no user interaction, but with limited scope and impact. The vulnerability affects a critical component of Yonyou KSOA, a widely used enterprise service bus and middleware platform, which is integral to many business processes. Without remediation, attackers could leverage this flaw to gain unauthorized access to sensitive business data or disrupt operations.
Potential Impact
For European organizations, the exploitation of CVE-2026-1177 could result in significant data breaches, unauthorized data manipulation, and potential service disruptions. Given Yonyou KSOA's role in enterprise middleware, compromised systems could lead to cascading failures in interconnected applications, affecting business continuity. Confidential business information, customer data, and internal communications could be exposed or altered, leading to regulatory non-compliance under GDPR and other data protection laws. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against organizations slow to patch or implement mitigations. Operational disruptions could impact sectors such as finance, manufacturing, and public services that rely on Yonyou KSOA for integration and workflow automation. Additionally, the lack of vendor response complicates remediation efforts, potentially prolonging exposure and increasing risk.
Mitigation Recommendations
Organizations should immediately implement strict input validation and sanitization for the 'folderid' parameter within the /kmf/save_folder.jsp endpoint, ideally employing parameterized queries or prepared statements to prevent SQL injection. In the absence of an official patch, deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting this parameter is critical. Network segmentation should be enforced to limit access to the vulnerable service, restricting it to trusted internal networks where possible. Continuous monitoring and logging of database queries and web server access logs should be enhanced to detect anomalous activities indicative of exploitation attempts. Organizations should also conduct thorough audits of their Yonyou KSOA deployments to identify and isolate vulnerable instances. Engaging with cybersecurity vendors for virtual patching solutions and threat intelligence updates is advisable. Finally, organizations must prepare incident response plans specific to SQL injection attacks to minimize impact if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-19T07:33:45.859Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696ea73f4623b1157cd0166e
Added to database: 1/19/2026, 9:50:55 PM
Last enriched: 1/27/2026, 8:02:54 PM
Last updated: 2/6/2026, 7:21:10 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2063: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-25753: CWE-259: Use of Hard-coded Password in Praskla-Technology assessment-placipy
CriticalCVE-2026-25752: CWE-862: Missing Authorization in frangoteam FUXA
CriticalCVE-2026-25751: CWE-306: Missing Authentication for Critical Function in frangoteam FUXA
CriticalCVE-2026-25651: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in tgies client-certificate-auth
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.