SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws

SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws

SAP released 17 new security notes on January 13, 2026, addressing vulnerabilities affecting widely deployed enterprise systems.

The patch day includes four critical-severity flaws spanning SQL injection, remote code execution, and code injection attacks that could allow authenticated and unauthenticated threat actors to compromise SAP environments.

The most severe vulnerabilities target core SAP infrastructure. CVE-2026-0501 exploits a SQL injection flaw in SAP S/4HANA’s General Ledger module (CVSS 9.9), allowing authenticated attackers to execute arbitrary SQL queries and compromise the integrity of financial data.

The vulnerability affects S4CORE versions 102 through 109 across both private cloud and on-premise deployments.

A remote code execution flaw in SAP Wily Introscope Enterprise Manager (CVE-2026-0500, CVSS 9.6) requires only user interaction to trigger and affects version 10.8.

This vulnerability could enable attackers to gain system-level access without authentication, posing a significant risk to enterprise monitoring infrastructure.

CVE ID Vulnerability Type Affected Product CVSS Score Severity
CVE-2026-0501 SQL Injection SAP S/4HANA (General Ledger) 9.9 Critical
CVE-2026-0500 Remote Code Execution SAP Wily Introscope Enterprise Manager 9.6 Critical
CVE-2026-0498 Code Injection SAP S/4HANA (Private Cloud/On-Premise) 9.1 Critical
CVE-2026-0491 Code Injection SAP Landscape Transformation 9.1 Critical
CVE-2026-0492 Privilege Escalation SAP HANA Database 8.8 High
CVE-2026-0507 OS Command Injection SAP Application Server ABAP/NetWeaver RFCSDK 8.4 High
CVE-2026-0511 Multiple Vulnerabilities SAP Fiori App (Intercompany Balance Reconciliation) 8.1 High
CVE-2026-0506 Missing Authorization Check SAP NetWeaver Application Server ABAP 8.1 High
CVE-2026-0503 Missing Authorization Check SAP ERP/S/4HANA (EHS Management) 6.4 Medium
CVE-2026-0499 Cross-Site Scripting (XSS) SAP NetWeaver Enterprise Portal 6.1 Medium
CVE-2026-0514 Cross-Site Scripting (XSS) SAP Business Connector 6.1 Medium
CVE-2026-0513 Open Redirect SAP Supplier Relationship Management 4.7 Medium
CVE-2026-0494 Information Disclosure SAP Fiori App (Intercompany Balance Reconciliation) 4.3 Medium
CVE-2026-0493 Cross-Site Request Forgery (CSRF) SAP Fiori App (Intercompany Balance Reconciliation) 4.3 Medium
CVE-2026-0497 Missing Authorization Check Business Server Pages Application 4.3 Medium
CVE-2026-0504 Insufficient Input Handling SAP Identity Management 3.8 Low
CVE-2026-0510 Obsolete Encryption Algorithm NW AS Java UME User Mapping 3.0 Low

Code injection vulnerabilities have surfaced in both SAP S/4HANA (CVE-2026-0498, CVSS 9.1) and SAP Landscape Transformation (CVE-2026-0491, CVSS 9.1), though they require high-privilege authentication.

The HANA privilege escalation flaw (CVE-2026-0492, CVSS 8.8) and OS command injection in Application Server components (CVE-2026-0507, CVSS 8.4) round out the high-severity threats.

Application-level vulnerabilities include multiple authorization bypasses and cross-site attacks affecting Fiori applications, NetWeaver components, and enterprise portal infrastructure.

Missing authorization checks in NetWeaver Application Server (CVE-2026-0506, CVSS 8.1) and EHS Management systems (CVE-2026-0503, CVSS 6.4) could allow privilege escalation through authenticated access.

Cross-site scripting flaws have been identified in the Enterprise Portal (CVE-2026-0499, CVSS 6.1) and the Business Connector (CVE-2026-0514, CVSS 6.1).

In contrast, cross-site request forgery affects Fiori’s Intercompany Balance Reconciliation app (CVE-2026-0493, CVSS 4.3).

SAP strongly recommends customers prioritize patching these vulnerabilities immediately, particularly the critical-severity flaws affecting S/4HANA and Wily Introscope.

Organizations should consult SAP’s support portal for patch availability and deployment guidance specific to their installed versions and system configurations.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link