Submit #721324: Yonyou KSOA V9.0 SQL Injectioninfo

TitleYonyou KSOA V9.0 SQL Injection
DescriptionA SQL injection vulnerability exists in the Yonyou Space-Time KSOA Platform v9.0. The vulnerability is located in the /worksheet/agent_worksadd.jsp file. The application accepts untrusted input via the id HTTP GET parameter and directly concatenates it into a backend SQL query without proper validation or parameterization. This allows an unauthenticated remote attacker to inject malicious SQL commands, leading to potential data leakage, unauthorized database access, or server manipulation. The backend database appears to be Microsoft SQL Server.
Source⚠️ https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksadd.jsp%20SQL%20injection.md
User
 jiefengliang (UID 93721)
Submission12/22/2025 06:20 (4 months ago)
Moderation01/01/2026 12:04 (10 days later)
StatusAccepted
VulDB entry339343 [Yonyou KSOA 9.0 HTTP GET Parameter agent_worksadd.jsp ID sql injection]
Points20

Do you know our Splunk app?

Download it now for free!