Submit #734550: Yonyou KSOA v9.0 SQL Injectioninfo

TitleYonyou KSOA v9.0 SQL Injection
DescriptionA SQL injection vulnerability exists in the Yonyou Space-Time KSOA Platform v9.0. The vulnerability is located in the `/worksheet/work_mod.jsp` file. The application accepts untrusted input via the `id` HTTP GET parameter and directly concatenates it into a backend SQL query without proper validation or parameterization. This allows an **unauthenticated remote attacker** to inject malicious SQL commands, leading to potential data leakage, unauthorized database access, or server manipulation. The backend database appears to be Microsoft SQL Server.
Source⚠️ https://github.com/LX-66-LX/cve/issues/9
User LX-66-LX (UID 92717)
Submission01/08/2026 15:51 (4 months ago)
Moderation01/17/2026 19:16 (9 days later)
StatusAccepted
VulDB entry341715 [Yonyou KSOA 9.0 HTTP GET Parameter /worksheet/work_mod.jsp ID sql injection]
Points20

Want to know what is going to be exploited?

We predict KEV entries!