CVE-2025-15436

Source: cna@vuldb.com

MEDIUM
6.9
Published: January 2, 2026 at 08:15 AM
Modified: January 7, 2026 at 05:58 PM

Vulnerability Description

A vulnerability has been found in Yonyou KSOA 9.0. Affected by this issue is some unknown functionality of the file /worksheet/work_edit.jsp. Such manipulation of the argument Report leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com

AI Security Analysis

01 // Technical Summary

Yonyou KSOA 9.0 is vulnerable to a critical SQL injection flaw, allowing attackers to remotely execute arbitrary database queries. This vulnerability, located in the /worksheet/work_edit.jsp file, can lead to complete system compromise and data exfiltration due to the vendor's lack of response and public exploit availability. Organizations using this software are at significant risk and should prioritize immediate mitigation efforts.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious SQL injection payload and includes it within the Report parameter of a specially crafted HTTP request to /worksheet/work_edit.jsp. This request is sent to the vulnerable Yonyou KSOA 9.0 server.

Step 2: Request Processing: The server receives the HTTP request and processes the Report parameter's value.

Step 3: Query Construction: The application's code constructs a SQL query, directly incorporating the attacker-supplied Report parameter without proper sanitization.

Step 4: Query Execution: The database server executes the maliciously crafted SQL query, which includes the attacker's injected code.

Step 5: Data Exfiltration/System Compromise: Depending on the injected SQL payload, the attacker can then extract sensitive data (e.g., usernames, passwords, database contents) or execute commands on the database server, potentially leading to complete system compromise.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation of the Report parameter within the /worksheet/work_edit.jsp file. The application directly incorporates user-supplied input into a database query without proper sanitization or escaping. This allows an attacker to inject malicious SQL code, altering the intended query logic and enabling unauthorized access to sensitive data, including user credentials, financial records, and other confidential information. The root cause is a missing or inadequate implementation of parameterized queries or prepared statements, which are crucial for preventing SQL injection attacks. The lack of input validation allows for the injection of SQL commands, leading to unauthorized data access and potential system compromise.

04 // Exploitation Status

Public PoC. The exploit has been disclosed to the public, increasing the likelihood of exploitation. The vendor has not responded, making the vulnerability more dangerous. The lack of a patch and public availability of the exploit means the vulnerability is likely **Actively exploited**.

05 // Threat Intelligence

While no specific APT groups are directly linked to this CVE at this time, the public availability of the exploit and the nature of the vulnerability make it attractive to various threat actors, including those seeking to steal data or establish a foothold within an organization's network. The lack of vendor response and public PoC status increases the likelihood of exploitation by both skilled and less-skilled attackers. This vulnerability does not currently have a CISA KEV entry, but given the severity and public availability of the exploit, it is likely to be added soon.

06 // Detection & Hunting

  • Network Intrusion Detection Systems (NIDS) should be configured to detect SQL injection attempts. Look for suspicious patterns in HTTP requests, such as the use of SQL keywords (e.g., SELECT, UPDATE, INSERT, DROP) within the Report parameter of requests to /worksheet/work_edit.jsp.

  • Web Application Firewalls (WAFs) can be deployed to filter malicious requests. Configure the WAF to block requests containing SQL injection payloads, such as those using common SQL injection techniques (e.g., ' OR '1'='1, UNION SELECT, --).

  • Review server logs for unusual activity, such as a high volume of requests to /worksheet/work_edit.jsp or unexpected database errors. Analyze the logs for suspicious SQL queries.

  • Implement file integrity monitoring to detect changes to /worksheet/work_edit.jsp or other critical system files.

  • Monitor database activity for suspicious queries or unauthorized access attempts.

07 // Remediation & Hardening

  • Implement input validation and sanitization: Ensure that all user-supplied input, including the Report parameter, is properly validated and sanitized before being used in SQL queries. This includes escaping special characters and using parameterized queries or prepared statements.

  • Apply the latest security patches: Since the vendor has not responded, organizations should consider alternative solutions such as migrating to a different product or implementing a WAF.

  • Implement a Web Application Firewall (WAF): Deploy a WAF to filter malicious traffic and block SQL injection attempts.

  • Review and harden database configurations: Ensure that the database server is configured securely, with appropriate access controls and least privilege principles.

  • Conduct regular vulnerability scans: Perform regular vulnerability scans to identify and address security weaknesses in the application and infrastructure.

  • Implement a robust incident response plan: Develop and test an incident response plan to handle security incidents, including SQL injection attacks.

08 // Affected Products

Yonyou KSOA 9.0
Advertisement