Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

SAP SE

#e4686d1a-f260-4930-ac4c-2f5c992778dd
PolicyEmail

Short Name

sap

Program Role

CNA

Top Level Root

MITRE Corporation

Security Advisories

View Advisories

Domain

sap.com

Country

Germany

Scope

All SAP products.
Reported CVEsVendorsProductsReports
1600Vulnerabilities found

CVE-2026-34264
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 8.59%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:09
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure vulnerability in SAP Human Capital Management for SAP S/4HANA

During authorization checks in SAP Human Capital Management for SAP S/4HANA, the system returns specific messages. Due to this, an authenticated user with low privileges could guess and enumerate the content shown, beyond their authorized scope. This leads to disclosure of sensitive information causing a high impact on confidentiality, while integrity and availability are unaffected.

Action-Not Available
Vendor-SAP SE
Product-SAP Human Capital Management for SAP S/4HANA
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2026-34262
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5||MEDIUM
EPSS-0.03% / 6.85%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:09
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure Vulnerability in SAP HANA Cockpit and HANA Database Explorer

Information Disclosure Vulnerability in SAP HANA Cockpit and HANA Database Explorer

Action-Not Available
Vendor-SAP SE
Product-SAP HANA Cockpit and HANA Database Explorer
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2026-34261
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 6.16%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:08
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP Business Analytics and SAP Content Management

Due to a missing authorization check in SAP Business Analytics and SAP Content Management, an authenticated user could make unauthorized calls to certain remote function modules, potentially accessing sensitive information beyond their intended permissions. This vulnerability affects confidentiality, with no impact on integrity and availability.

Action-Not Available
Vendor-SAP SE
Product-SAP Business Analytics and SAP Content Management
CWE ID-CWE-862
Missing Authorization
CVE-2026-34257
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 10.53%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:08
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Redirect vulnerability in SAP NetWeaver Application Server ABAP

Due to an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated attacker could craft malicious URL that, if accessed by a victim, they could be redirected to the page controlled by the attacker. This causes low impact on confidentiality and integrity of the application with no impact on availability.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server ABAP
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2026-34256
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-7.1||HIGH
EPSS-0.04% / 10.72%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:08
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise)

Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization. If the overwritten report is subsequently executed, the intended functionality could become unavailable. Successful exploitation impacts availability, with a limited impact on integrity confined to the affected report, while confidentiality remains unaffected.

Action-Not Available
Vendor-SAP SE
Product-SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise)
CWE ID-CWE-862
Missing Authorization
CVE-2026-27683
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.1||MEDIUM
EPSS-0.03% / 8.05%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:08
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected cross site scripting vulnerability in SAP BusinessObjects Business Intelligence Platform

SAP BusinessObjects Business Intelligence application allows an authenticated attacker to inject malicious JavaScript payloads through crafted URLs. When a victim accesses the URL, the script executes in the user�s browser, potentially exposing restricted information. This results in a low impact on confidentiality with no impact on integrity and availability.

Action-Not Available
Vendor-SAP SE
Product-SAP BusinessObjects Business Intelligence Platform
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-27681
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-9.9||CRITICAL
EPSS-0.05% / 14.43%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:08
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse

Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.

Action-Not Available
Vendor-SAP SE
Product-SAP Business Planning and Consolidation and SAP Business Warehouse
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2026-27679
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:07
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP S/4HANA Frontend OData Service (Manage Reference Structures)

Due to missing authorization checks in the SAP S/4HANA frontend OData Service (Manage Reference Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA Frontend OData Service (Manage Reference Structures)
CWE ID-CWE-862
Missing Authorization
CVE-2026-27678
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:07
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP S/4HANA Backend OData Service (Manage Reference Structures)

Due to missing authorization checks in the SAP S/4HANA backend OData Service (Manage Reference Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA Backend OData Service (Manage Reference Structures)
CWE ID-CWE-862
Missing Authorization
CVE-2026-27677
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:07
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP S/4HANA OData Service (Manage Reference Equipment)

Due to missing authorization checks in the SAP S/4HANA OData Service (Manage Reference Equipment), an attacker could update and delete child entities via OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA OData Service (Manage Reference Equipment)
CWE ID-CWE-862
Missing Authorization
CVE-2026-27676
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 7.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:07
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP S/4HANA OData Service (Manage Technical Object Structures)

Due to missing authorization checks in the SAP S/4HANA OData Service (Manage Technical Object Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability results in a low impact on integrity, while confidentiality and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA OData Service (Manage Technical Object Structures)
CWE ID-CWE-862
Missing Authorization
CVE-2026-27675
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-2||LOW
EPSS-0.03% / 7.78%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:07
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection vulnerability in SAP Landscape Transformation

SAP Landscape Transformation contains a vulnerability in an RFC-exposed function module that could allow a high privileged adversary to inject arbitrary ABAP code and operating system commands. Due to this, some information could be modified, but the attacker does not have control over kind or degree. This leads to a low impact on integrity, while confidentiality and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-SAP Landscape Transformation
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2026-27674
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:06
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection vulnerability in SAP NetWeaver Application Server Java (Web Dynpro Java)

Due to a Code Injection vulnerability in SAP NetWeaver Application Server Java (Web Dynpro Java), an unauthenticated attacker could supply crafted input that is interpreted by the application and causes it to reference attacker-controlled content. If a victim accesses the affected functionality, that attacker-controlled content could be executed in the victim�s browser, potentially resulting in session compromise. This could allow the attacker to execute arbitrary client-side code, impacting the confidentiality and integrity of the application, with no impact to availability.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server Java (Web Dynpro Java)
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2026-27673
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.9||MEDIUM
EPSS-0.03% / 8.81%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:06
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization Check in SAP S/4HANA (Private Cloud and On-Premise)

Due to a missing authorization check, SAP S/4HANA (Private Cloud and On-Premise) allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations which could leads to no impact on Confidentiality, Low impact on Integrity and Availability of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA (Private Cloud and On-Premise)
CWE ID-CWE-862
Missing Authorization
CVE-2026-27672
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 6.85%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:06
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in Material Master Application

The Material Master application does not enforce authorization checks for authenticated users when executing reports, resulting in the disclosure of sensitive information. This vulnerability has a low impact on confidentiality and does not affect integrity and availability of the system.

Action-Not Available
Vendor-SAP SE
Product-Material Master Application
CWE ID-CWE-862
Missing Authorization
CVE-2026-24318
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.2||MEDIUM
EPSS-0.03% / 9.74%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:06
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Session Management vulnerability in SAP BusinessObjects Business Intelligence Platform

Due to an Insecure session management vulnerability in SAP Business Objects Business Intelligence Platform, an unauthenticated attacker could obtain valid session tokens and reuse them to gain unauthorized access to a victim�s session. If the application continues to accept previously issued tokens after authentication, the attacker could assume the victim�s authenticated context. This could allow the attacker to access or modify information within the victim�s session scope, impacting confidentiality and integrity, while availability remains unaffected.

Action-Not Available
Vendor-SAP SE
Product-SAP BusinessObjects Business Intelligence Platform
CWE ID-CWE-539
Use of Persistent Cookies Containing Sensitive Information
CVE-2026-0512
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 21.17%
||
7 Day CHG~0.00%
Published-14 Apr, 2026 | 00:06
Updated-17 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Scripting (XSS) vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog)

Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL, that if accessed by a victim, results in execution of malicious content within the victim's browser. This could allow the attacker to access and modify information, impacting the confidentiality and integrity of the application, while availability remains unaffected.

Action-Not Available
Vendor-SAP SE
Product-SAP Supplier Relationship Management (SICF Handler in SRM Catalog)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-27689
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-7.7||HIGH
EPSS-0.08% / 24.40%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:19
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service (DOS) in SAP Supply Chain Management

Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonged loop execution that consumes excessive system resources, potentially rendering the system unavailable. Successful exploitation results in a denial-of-service condition that impacts availability, while confidentiality and integrity remain unaffected.

Action-Not Available
Vendor-SAP SE
Product-SAP Supply Chain Management
CWE ID-CWE-606
Unchecked Input for Loop Condition
CVE-2026-27688
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5||MEDIUM
EPSS-0.03% / 9.21%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:18
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP NetWeaver Application Server for ABAP

Due to a missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker with user privileges could read Database Analyzer Log Files via a specific RFC function module. The attacker with the necessary privileges to execute this function module could potentially escalate their privileges and read the sensitive data, resulting in a limited impact on the confidentiality of the information stored. However, the integrity and availability of the system are not affected.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server for ABAP
CWE ID-CWE-862
Missing Authorization
CVE-2026-27687
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.8||MEDIUM
EPSS-0.04% / 10.98%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:18
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP S/4HANA HCM Portugal and SAP ERP HCM Portugal

Due to missing authorization check in SAP S/4HANA HCM Portugal and SAP ERP HCM Portugal, a user with high privileges could access sensitive data belonging to another company. This vulnerability has a high impact on confidentiality and does not affect integrity and availability.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA HCM Portugal and SAP ERP HCM Portugal
CWE ID-CWE-862
Missing Authorization
CVE-2026-27686
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.9||MEDIUM
EPSS-0.05% / 14.23%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:18
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP Business Warehouse (Service API)

Due to a Missing Authorization Check in SAP Business Warehouse (Service API), an authenticated attacker could perform unauthorized actions via an affected RFC function module. Successful exploitation could enable unauthorized configuration and control changes, potentially disrupting request processing and causing denial of service. This results in low impact on integrity and high impact on availability, while confidentiality remains unaffected.

Action-Not Available
Vendor-SAP SE
Product-SAP Business Warehouse (Service API)
CWE ID-CWE-862
Missing Authorization
CVE-2026-27685
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-9.1||CRITICAL
EPSS-0.06% / 19.45%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:18
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Deserialization in SAP NetWeaver Enterprise Portal Administration

SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Enterprise Portal Administration
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2026-27684
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 12.18%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:18
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection Vulnerability in SAP NetWeaver (Feedback Notification)

SAP NetWeaver Feedback Notifications Service contains a SQL injection vulnerability that allows an authenticated attacker to inject arbitrary SQL code through user-controlled input fields. The application concatenates these inputs directly into SQL queries without proper validation or escaping. As a result, an attacker can manipulate the WHERE clause logic and potentially gain unauthorized access to or modify database information. This vulnerability has no impact on integrity and low impact on the confidentiality and availability of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver (Feedback Notification)
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2026-24317
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5||MEDIUM
EPSS-0.04% / 13.58%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:18
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DLL Hijacking vulnerability in SAP GUI for Windows with active GuiXT

SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability.

Action-Not Available
Vendor-SAP SE
Product-SAP GUI for Windows with active GuiXT
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2026-24316
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 9.21%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:17
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in SAP NetWeaver Application Server for ABAP

SAP NetWeaver Application Server for ABAP provides an ABAP Report for testing purposes, which allows to send HTTP requests to arbitrary internal or external endpoints. The report is therefore vulnerable to Server-Side Request Forgery (SSRF). Successful exploitation could lead to interaction with potentially sensitive internal endpoints, resulting in a low impact on data confidentiality and integrity. There is no impact on availability of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server for ABAP
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2026-24313
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5||MEDIUM
EPSS-0.03% / 9.21%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:17
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP Solution Tools Plug-In (ST-PI)

SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing system information to be disclosed. This vulnerability has a low impact on confidentiality and does not affect integrity or availability.

Action-Not Available
Vendor-SAP SE
Product-SAP Solution Tools Plug-In (ST-PI)
CWE ID-CWE-862
Missing Authorization
CVE-2026-24311
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.6||MEDIUM
EPSS-0.01% / 0.78%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:17
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Storage Protection vulnerability in SAP Customer Checkout 2.0

The SAP Customer Checkout application exhibits certain design characteristics that involve locally storing operational data using reversible protection mechanisms. Access to this data, combined with user?initiated interaction, may allow modifications to occur without validation. Such changes could affect system behaviour during startup, resulting in a high impact on the application's confidentiality and integrity, with a low impact on availability.

Action-Not Available
Vendor-SAP SE
Product-SAP Customer Checkout 2.0
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2026-24310
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-3.5||LOW
EPSS-0.03% / 9.21%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:17
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP NetWeaver Application Server for ABAP

Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker could execute specific ABAP function module and read the sensitive information from database catalog of the ABAP system. This vulnerability has low impact on the application's confidentiality with no effect on the integrity and availability.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server for ABAP
CWE ID-CWE-862
Missing Authorization
CVE-2026-24309
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 13.87%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:17
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP NetWeaver Application Server for ABAP

Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker could execute specific ABAP function module to read, modify or insert entries into the database configuration table of the ABAP system. This unauthorized content change could lead to reduced system performance or interruptions. The vulnerability has low impact on the application's integrity and availability, with no effect on confidentiality.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server for ABAP
CWE ID-CWE-862
Missing Authorization
CVE-2026-0489
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 13.20%
||
7 Day CHG~0.00%
Published-10 Mar, 2026 | 00:17
Updated-11 Mar, 2026 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DOM-based Cross-Site Scripting (XSS) Vulnerability in SAP Business One (Job Service)

Due to insufficient validation of user-controlled input in the URLs query parameter. SAP Business One Job Service could allow an unauthenticated attacker to inject specially crafted input which upon user interaction could result in a DOM-based Cross-Site Scripting (XSS) vulnerability. This issue had a low impact on the confidentiality and integrity of the application with no impact on availability.

Action-Not Available
Vendor-SAP SE
Product-SAP Business One (Job Service)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-24314
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 10.92%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 05:23
Updated-03 Mar, 2026 | 00:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure vulnerability in S/4HANA (Manage Payment Media)

Under certain conditions SAP S/4HANA (Manage Payment Media) allows an authenticated attacker to access information which would otherwise be restricted. This could cause low impact on confidentiality of the application while integrity and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-s\/4hana_uiapfi70s\/4hana_uis4hS/4HANA (Manage Payment Media)
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2026-24328
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 25.39%
||
7 Day CHG+0.01%
Published-10 Feb, 2026 | 03:04
Updated-17 Feb, 2026 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Redirection vulnerability in Business Server Pages Application (TAF_APPLAUNCHER)

SAP TAF_APPLAUNCHER within Business Server Pages allows unauthenticated attacker to craft malicious links that, when clicked by a victim, redirect them to attacker?controlled sites, potentially exposing or altering sensitive information in the victim�s browser. This results in a low impact on confidentiality and integrity, with no impact on the availability of the application.

Action-Not Available
Vendor-SAP SE
Product-business_server_pagesBusiness Server Pages Application (TAF_APPLAUNCHER)
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2026-24327
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.12%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:04
Updated-17 Feb, 2026 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization Check in SAP Strategic Enterprise Management (Balanced Scorecard in BSP Application)

Due to missing authorization check in SAP Strategic Enterprise Management (Balanced Scorecard in Business Server Pages), an authenticated attacker could access information that they are otherwise unauthorized to view. This leads to low impact on confidentiality and no effect on integrity or availability.

Action-Not Available
Vendor-SAP SE
Product-strategic_enterprise_managementSAP Strategic Enterprise Management (Balanced Scorecard in BSP Application)
CWE ID-CWE-862
Missing Authorization
CVE-2026-24326
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.44%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:04
Updated-17 Feb, 2026 | 15:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing authorization check in SAP S/4HANA Defense & Security (Disconnected Operations)

Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Security, an attacker with user privileges could call remote-enabled function modules to do direct update on standard SAP database table . This results in low impact on integrity, with no impact on confidentiality or availability of the application.

Action-Not Available
Vendor-SAP SE
Product-s\/4hana_defense_\&_securitySAP S/4HANA Defense & Security (Disconnected Operations)
CWE ID-CWE-862
Missing Authorization
CVE-2026-24325
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.75%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:04
Updated-17 Feb, 2026 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross Site Scripting (XSS) vulnerability in SAP BusinessObjects Enterprise (Central Management Console)

SAP BusinessObjects Enterprise does not sufficiently encode user-controlled inputs, leading to Stored Cross-Site Scripting (XSS) vulnerability. This enables an admin user to inject malicious JavaScript into a website and the injected script gets executed when the user visits the compromised page.This vulnerability has low impact on confidentiality and integrity of the data. There is no impact on the availability of the application.

Action-Not Available
Vendor-SAP SE
Product-businessobjects_enterpriseSAP BusinessObjects Enterprise (Central Management Console)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2026-24324
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 5.47%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:04
Updated-17 Feb, 2026 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service (DOS) vulnerability in SAP BusinessObjects Business Intelligence Platform (AdminTools)

SAP BusinessObjects Business Intelligence Platform (AdminTools) allows an authenticated attacker with user privileges to execute a specific query in AdminTools that could cause the Content Management Server (CMS) to crash, rendering the CMS partially or completely unavailable and resulting in the denial of service of the Content Management Server (CMS). Successful exploitation impacts system availability, while confidentiality and integrity remain unaffected.

Action-Not Available
Vendor-SAP SE
Product-businessobjects_business_intelligence_platformSAP BusinessObjects Business Intelligence Platform (AdminTools)
CWE ID-CWE-405
Asymmetric Resource Consumption (Amplification)
CVE-2026-24323
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 8.02%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:04
Updated-17 Feb, 2026 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple vulnerabilities in BSP Applications of SAP Document Management System

The BSP applications allow an unauthenticated user to inject malicious script content via user-controlled URL parameters that are not sufficiently sanitized. When a victim accesses a crafted URL, the injected script is executed in the victim�s browser, leading to a low impact on confidentiality and integrity, and no impact on the availability of the application.

Action-Not Available
Vendor-SAP SE
Product-document_management_systemerps4coreSAP Document Management System
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2026-24322
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-7.7||HIGH
EPSS-0.04% / 13.45%
||
7 Day CHG+0.01%
Published-10 Feb, 2026 | 03:04
Updated-17 Feb, 2026 | 15:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP Solution Tools Plug-In (ST-PI)

SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing sensitive information to be disclosed. This vulnerability has a high impact on confidentiality and does not affect integrity or availability.

Action-Not Available
Vendor-SAP SE
Product-solution_tools_plug-inSAP Solution Tools Plug-In (ST-PI)
CWE ID-CWE-862
Missing Authorization
CVE-2026-24321
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.05%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:03
Updated-17 Feb, 2026 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure vulnerability in SAP Commerce Cloud

SAP Commerce Cloud exposes multiple API endpoints to unauthenticated users, allowing them to submit requests to these open endpoints to retrieve sensitive information that is not intended to be publicly accessible via the front-end. This vulnerability has a low impact on confidentiality and does not affect integrity and availability.

Action-Not Available
Vendor-SAP SE
Product-commerce_cloudSAP Commerce Cloud
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2026-24320
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-3.1||LOW
EPSS-0.01% / 2.60%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:03
Updated-17 Feb, 2026 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memory Corruption vulnerability in SAP NetWeaver and ABAP Platform (Application Server ABAP)

Due to improper memory management in SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker could exploit logical errors in memory management by supplying specially crafted input containing unique characters, which are improperly converted. This may result in memory corruption and the potential leakage of memory content. Successful exploitation of this vulnerability would have a low impact on the confidentiality of the application, with no effect on its integrity or availability.

Action-Not Available
Vendor-SAP SE
Product-netweaver_as_abap_krnl64ucnetweaver_as_abap_krnl64nucnetweaver_as_abap_kernelSAP NetWeaver and ABAP Platform (Application Server ABAP)
CWE ID-CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
CWE ID-CWE-787
Out-of-bounds Write
CVE-2026-24319
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.8||MEDIUM
EPSS-0.00% / 0.17%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:03
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure Vulnerability in SAP Business One (B1 Client Memory Dump Files)

In SAP Business One, sensitive information is written to the application�s memory dump files without obfuscation. Gaining access to this information could potentially lead to unauthorized operations within the B1 environment, including modification of company data. This issue results in a high impact on confidentiality and integrity, with no impact on availability.

Action-Not Available
Vendor-SAP SE
Product-business_oneSAP Business One (B1 Client Memory Dump Files)
CWE ID-CWE-316
Cleartext Storage of Sensitive Information in Memory
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2026-24312
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.2||MEDIUM
EPSS-0.03% / 7.56%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:03
Updated-17 Feb, 2026 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing authorization check in SAP Business Workflow

An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authenticated administrative user can bypass role restrictions by leveraging permissions from a less sensitive function to execute unauthorized, high-privilege actions. This has a high impact on data integrity, with low impact on confidentiality and no impact on availability of the application.

Action-Not Available
Vendor-SAP SE
Product-sap_basisSAP Business Workflow
CWE ID-CWE-862
Missing Authorization
CVE-2026-23689
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-7.7||HIGH
EPSS-0.11% / 28.60%
||
7 Day CHG+0.01%
Published-10 Feb, 2026 | 03:03
Updated-27 Feb, 2026 | 14:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service (DOS) in SAP Supply Chain Management

Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonged loop execution that consumes excessive system resources, potentially rendering the system unavailable. Successful exploitation results in a denial-of-service condition that impacts availability, while confidentiality and integrity remain unaffected.

Action-Not Available
Vendor-SAP SE
Product-advanced_planning_and_optimizationsupply_chain_managementSAP Supply Chain Management
CWE ID-CWE-606
Unchecked Input for Loop Condition
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-23688
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 12.48%
||
7 Day CHG+0.01%
Published-10 Feb, 2026 | 03:02
Updated-17 Feb, 2026 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP Fiori App (Manage Service Entry Sheets - Lean Services)

SAP Fiori App Manage Service Entry Sheets does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has low impact on integrity, confidentiality and availability are not impacted.

Action-Not Available
Vendor-SAP SE
Product-s4coreSAP Fiori App (Manage Service Entry Sheets - Lean Services)
CWE ID-CWE-862
Missing Authorization
CVE-2026-23687
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-8.8||HIGH
EPSS-0.02% / 5.09%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:02
Updated-26 Feb, 2026 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XML Signature Wrapping in SAP NetWeaver AS ABAP and ABAP Platform

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered identity information, unauthorized access to sensitive user data and potential disruption of normal system usage.

Action-Not Available
Vendor-SAP SE
Product-sap_basisSAP NetWeaver AS ABAP and ABAP Platform
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2026-23686
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-3.4||LOW
EPSS-0.04% / 11.54%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:02
Updated-17 Feb, 2026 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CRLF Injection vulnerability in SAP NetWeaver Application Server Java

Due to a CRLF Injection vulnerability in SAP NetWeaver Application Server Java, an authenticated attacker with administrative access could submit specially crafted content to the application. If processed by the application, this content enables injection of untrusted entries into generated configuration, allowing manipulation of application-controlled settings. Successful exploitation leads to a low impact on integrity, while confidentiality and availability remain unaffected.

Action-Not Available
Vendor-SAP SE
Product-netweaver_application_server_javaSAP NetWeaver Application Server Java
CWE ID-CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
CWE ID-CWE-436
Interpretation Conflict
CVE-2026-23685
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.4||MEDIUM
EPSS-0.12% / 30.50%
||
7 Day CHG+0.01%
Published-10 Feb, 2026 | 03:02
Updated-17 Feb, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Deserialization vulnerability in SAP NetWeaver (JMS service)

Due to a Deserialization vulnerability in SAP NetWeaver (JMS service), an attacker authenticated as an administrator with local access could submit specially crafted content to the server. If processed by the application, this content could trigger unintended behavior during internal logic execution, potentially causing a denial of service. Successful exploitation results in a high impact on availability, while confidentiality and integrity remain unaffected.

Action-Not Available
Vendor-SAP SE
Product-netweaverSAP NetWeaver (JMS service)
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2026-23684
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 10.25%
||
7 Day CHG-0.00%
Published-10 Feb, 2026 | 03:02
Updated-17 Feb, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Race condition vulnerability in SAP Commerce Cloud

A race condition vulnerability exists in the SAP Commerce cloud. Because of this when an attacker adds products to a cart, it may result in a cart entry being created with erroneous product value which could be checked out. This leads to high impact on data integrity, with no impact on data confidentiality or availability of the application.

Action-Not Available
Vendor-SAP SE
Product-commerce_cloudSAP Commerce Cloud
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-366
Race Condition within a Thread
CVE-2026-23681
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.87%
||
7 Day CHG+0.01%
Published-10 Feb, 2026 | 03:02
Updated-17 Feb, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in a function module in SAP Support Tools Plug-In

Due to missing authorization check in a function module in SAP Support Tools Plug-In, an authenticated attacker could invoke specific function modules to retrieve information about the system and its configuration. This disclosure of the system information could assist the attacker to plan subsequent attacks. This vulnerability has a low impact on the confidentiality of the application, with no effect on its integrity or availability.

Action-Not Available
Vendor-SAP SE
Product-solution_tools_plug-inSAP Support Tools Plug-In
CWE ID-CWE-862
Missing Authorization
CVE-2026-0509
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-9.6||CRITICAL
EPSS-0.02% / 4.95%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 03:01
Updated-17 Feb, 2026 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on integrity and availability, and no impact on the confidentiality of the application.

Action-Not Available
Vendor-SAP SE
Product-netweaver_as_abap_krnl64ucnetweaver_as_abap_krnl64nucnetweaver_as_abap_kernelSAP NetWeaver Application Server ABAP and ABAP Platform
CWE ID-CWE-862
Missing Authorization
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 31
  • 32
  • Next