A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /worksheet/agent_worksdel.jsp of the component HTTP GET Parameter Handler. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksdel.jsp%20SQL%20injection.md | Exploit Third Party Advisory |
| https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksdel.jsp%20SQL%20injection.md#vulnerability-details-and-poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.339346 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339346 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.721348 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.721526 | Third Party Advisory VDB Entry |
| https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksdel.jsp%20SQL%20injection.md#vulnerability-details-and-poc | Exploit Third Party Advisory |
Configurations
History
15 Jan 2026, 16:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Yonyou
Yonyou ksoa |
|
| CPE | cpe:2.3:a:yonyou:ksoa:9.0:*:*:*:*:*:*:* | |
| References | () https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksdel.jsp%20SQL%20injection.md - Exploit, Third Party Advisory | |
| References | () https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksdel.jsp%20SQL%20injection.md#vulnerability-details-and-poc - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.339346 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.339346 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.721348 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.721526 - Third Party Advisory, VDB Entry |
05 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/master-abc/cve/blob/main/Yonyou%20Space-Time%20Enterprise%20Information%20Integration%20KSOA%20Platformworksheetagent_worksdel.jsp%20SQL%20injection.md#vulnerability-details-and-poc - |
02 Jan 2026, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-02 03:15
Updated : 2026-01-15 16:33
NVD link : CVE-2025-15424
Mitre link : CVE-2025-15424
CVE.ORG link : CVE-2025-15424
JSON object : View
Products Affected
yonyou
- ksoa
