CVE-2025-15424

MEDIUM6.9/ 10.0
Share:
Published: January 2, 2026 at 03:15 AM
Modified: January 15, 2026 at 04:33 PM
Source: cna@vuldb.com

Vulnerability Description

A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /worksheet/agent_worksdel.jsp of the component HTTP GET Parameter Handler. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Yonyou KSOA 9.0 is vulnerable to a critical SQL injection flaw, allowing attackers to remotely execute arbitrary database queries. This vulnerability, located in the /worksheet/agent_worksdel.jsp file, can lead to complete system compromise and data exfiltration. The vendor has not responded to the disclosure, making this a high-risk situation.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious HTTP GET request targeting the /worksheet/agent_worksdel.jsp endpoint.

Step 2: Parameter Manipulation: The attacker includes a crafted SQL injection payload within the ID parameter of the GET request. This payload is designed to alter the intended SQL query.

Step 3: Request Processing: The vulnerable agent_worksdel.jsp file receives the malicious request and extracts the attacker-controlled ID parameter.

Step 4: Query Execution: The application constructs a SQL query using the attacker-supplied ID parameter without proper sanitization. The malicious payload is directly incorporated into the query.

Step 5: Database Interaction: The crafted SQL query, now containing the attacker's payload, is executed against the database.

Step 6: Data Exfiltration/System Compromise: Depending on the payload, the attacker can then extract sensitive data (e.g., usernames, passwords), modify database contents, or potentially gain remote code execution on the server.

03 // Deep Technical Analysis

The vulnerability stems from improper input validation of the ID parameter within the /worksheet/agent_worksdel.jsp file. Specifically, the application fails to sanitize user-supplied input before incorporating it into a SQL query. This allows an attacker to inject malicious SQL code, altering the intended query logic. The root cause is a lack of parameterized queries or prepared statements, which would have prevented the injection of attacker-controlled data into the query. The absence of input validation, such as filtering or escaping special characters, further exacerbates the issue. The vulnerable code likely directly concatenates the ID parameter into a SQL query string without proper sanitization.

CVE-2025-15424 - MEDIUM Severity (6.9) | Free CVE Database | 4nuxd