SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws


SAP released 17 new security notes on January 13, 2026, addressing vulnerabilities affecting widely deployed enterprise systems.

The patch day includes four critical-severity flaws spanning SQL injection, remote code execution, and code injection attacks that could allow authenticated and unauthenticated threat actors to compromise SAP environments.

The most severe vulnerabilities target core SAP infrastructure. CVE-2026-0501 exploits a SQL injection flaw in SAP S/4HANA’s General Ledger module (CVSS 9.9), allowing authenticated attackers to execute arbitrary SQL queries and compromise the integrity of financial data.

The vulnerability affects S4CORE versions 102 through 109 across both private cloud and on-premise deployments.

A remote code execution flaw in SAP Wily Introscope Enterprise Manager (CVE-2026-0500, CVSS 9.6) requires only user interaction to trigger and affects version 10.8.

This vulnerability could enable attackers to gain system-level access without authentication, posing a significant risk to enterprise monitoring infrastructure.

CVE IDVulnerability TypeAffected ProductCVSS ScoreSeverity
CVE-2026-0501SQL InjectionSAP S/4HANA (General Ledger)9.9Critical
CVE-2026-0500Remote Code ExecutionSAP Wily Introscope Enterprise Manager9.6Critical
CVE-2026-0498Code InjectionSAP S/4HANA (Private Cloud/On-Premise)9.1Critical
CVE-2026-0491Code InjectionSAP Landscape Transformation9.1Critical
CVE-2026-0492Privilege EscalationSAP HANA Database8.8High
CVE-2026-0507OS Command InjectionSAP Application Server ABAP/NetWeaver RFCSDK8.4High
CVE-2026-0511Multiple VulnerabilitiesSAP Fiori App (Intercompany Balance Reconciliation)8.1High
CVE-2026-0506Missing Authorization CheckSAP NetWeaver Application Server ABAP8.1High
CVE-2026-0503Missing Authorization CheckSAP ERP/S/4HANA (EHS Management)6.4Medium
CVE-2026-0499Cross-Site Scripting (XSS)SAP NetWeaver Enterprise Portal6.1Medium
CVE-2026-0514Cross-Site Scripting (XSS)SAP Business Connector6.1Medium
CVE-2026-0513Open RedirectSAP Supplier Relationship Management4.7Medium
CVE-2026-0494Information DisclosureSAP Fiori App (Intercompany Balance Reconciliation)4.3Medium
CVE-2026-0493Cross-Site Request Forgery (CSRF)SAP Fiori App (Intercompany Balance Reconciliation)4.3Medium
CVE-2026-0497Missing Authorization CheckBusiness Server Pages Application4.3Medium
CVE-2026-0504Insufficient Input HandlingSAP Identity Management3.8Low
CVE-2026-0510Obsolete Encryption AlgorithmNW AS Java UME User Mapping3.0Low

Code injection vulnerabilities have surfaced in both SAP S/4HANA (CVE-2026-0498, CVSS 9.1) and SAP Landscape Transformation (CVE-2026-0491, CVSS 9.1), though they require high-privilege authentication.

The HANA privilege escalation flaw (CVE-2026-0492, CVSS 8.8) and OS command injection in Application Server components (CVE-2026-0507, CVSS 8.4) round out the high-severity threats.

Application-level vulnerabilities include multiple authorization bypasses and cross-site attacks affecting Fiori applications, NetWeaver components, and enterprise portal infrastructure.

Missing authorization checks in NetWeaver Application Server (CVE-2026-0506, CVSS 8.1) and EHS Management systems (CVE-2026-0503, CVSS 6.4) could allow privilege escalation through authenticated access.

Cross-site scripting flaws have been identified in the Enterprise Portal (CVE-2026-0499, CVSS 6.1) and the Business Connector (CVE-2026-0514, CVSS 6.1).

In contrast, cross-site request forgery affects Fiori’s Intercompany Balance Reconciliation app (CVE-2026-0493, CVSS 4.3).

SAP strongly recommends customers prioritize patching these vulnerabilities immediately, particularly the critical-severity flaws affecting S/4HANA and Wily Introscope.

Organizations should consult SAP’s support portal for patch availability and deployment guidance specific to their installed versions and system configurations.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link