CVE-2025-15436

MEDIUM6.9/ 10.0
Share:
Published: January 2, 2026 at 08:15 AM
Modified: January 7, 2026 at 05:58 PM
Source: cna@vuldb.com

Vulnerability Description

A vulnerability has been found in Yonyou KSOA 9.0. Affected by this issue is some unknown functionality of the file /worksheet/work_edit.jsp. Such manipulation of the argument Report leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com

AI Security Analysis

01 // Technical Summary

Yonyou KSOA 9.0 is vulnerable to a critical SQL injection flaw, allowing attackers to remotely execute arbitrary database queries. This vulnerability, located in the /worksheet/work_edit.jsp file, can lead to complete system compromise and data exfiltration due to the vendor's lack of response and public exploit availability. Organizations using this software are at significant risk and should prioritize immediate mitigation efforts.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious SQL injection payload and includes it within the Report parameter of a specially crafted HTTP request to /worksheet/work_edit.jsp. This request is sent to the vulnerable Yonyou KSOA 9.0 server.

Step 2: Request Processing: The server receives the HTTP request and processes the Report parameter's value.

Step 3: Query Construction: The application's code constructs a SQL query, directly incorporating the attacker-supplied Report parameter without proper sanitization.

Step 4: Query Execution: The database server executes the maliciously crafted SQL query, which includes the attacker's injected code.

Step 5: Data Exfiltration/System Compromise: Depending on the injected SQL payload, the attacker can then extract sensitive data (e.g., usernames, passwords, database contents) or execute commands on the database server, potentially leading to complete system compromise.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation of the Report parameter within the /worksheet/work_edit.jsp file. The application directly incorporates user-supplied input into a database query without proper sanitization or escaping. This allows an attacker to inject malicious SQL code, altering the intended query logic and enabling unauthorized access to sensitive data, including user credentials, financial records, and other confidential information. The root cause is a missing or inadequate implementation of parameterized queries or prepared statements, which are crucial for preventing SQL injection attacks. The lack of input validation allows for the injection of SQL commands, leading to unauthorized data access and potential system compromise.

CVE-2025-15436 - MEDIUM Severity (6.9) | Free CVE Database | 4nuxd