GBHackers

SAP Releases Patch for Critical SQL Injection Flaw in S/4HANA


A severe vulnerability has struck the heart of enterprise resource planning systems this month, threatening organizations worldwide with potential data breaches.

On May 12, 2026, the software giant released its monthly security patch update to address 15 newly discovered security flaws across its software ecosystem.

Enterprise defenders must prioritize these updates immediately, as attackers frequently target enterprise systems to extract sensitive corporate data or disrupt daily business operations.

Critical SQL Injection Flaw

The most severe threat in this release is a critical SQL injection vulnerability in the ABAP enterprise search component.

Tracked as CVE-2026-34260, this flaw carries a near-perfect severity score of 9.6 out of 10. If exploited, attackers could execute arbitrary database queries to steal, modify, or delete highly sensitive business records without needing elevated network privileges.

According to the SAP Support Portal, administrators must apply these patches on priority to protect their entire software landscapes. A second critical vulnerability, CVE-2026-34263, also received a 9.6 severity score and heavily impacts the commerce cloud configuration.

This missing authentication check allows unauthorized threat actors to bypass security controls entirely, leaving customer-facing commerce platforms dangerously exposed to remote compromise and data theft.

Beyond the two critical flaws, the May 2026 security update addresses several other significant vulnerabilities that require prompt mitigation. A high-severity operating system command injection flaw, identified as CVE-2026-34259, impacts the forecasting and replenishment software suite.

Carrying an 8.2 severity score, this vulnerability could allow a malicious actor with high privileges to execute dangerous commands directly on the underlying server operating system.

The release also remediates multiple medium-severity issues, including cross-site scripting, denial-of-service attacks, and missing authorization checks across platforms such as Business Objects and the NetWeaver application server.

Security teams are strongly advised to review their exposure to these secondary threats, as chained vulnerabilities often lead to deeper network infiltration.

Complete May 2026 Vulnerability Directory

The following table outlines all 15 security notes released during this cycle, structured for easy review and vulnerability management tracking based on your preferred reporting formats.

NoteCVETitleAffected ProductSeverityCVSS
3724838CVE-2026-34260SQL injection vulnerabilitySAP S/4HANA (Enterprise Search for ABAP)Critical9.6
3733064CVE-2026-34263Missing authentication checkSAP Commerce cloud configurationCritical9.6
3732471CVE-2026-34259OS Command InjectionSAP Forecasting & ReplenishmentHigh8.2
3730019CVE-2026-40135OS Command InjectionSAP NetWeaver AS for ABAP and ABAP PlatformMedium6.5
3718083CVE-2026-40133Missing Authorization checkSAP S/4HANA Condition MaintenanceMedium6.3
3727717CVE-2026-40137Cross-Site Scripting (XSS)Business Server Pages ApplicationMedium6.1
3667593CVE-2026-0502Cross Site Request Forgery (CSRF)SAP BusinessObjects Business IntelligenceMedium5.4
3721959CVE-2026-40132Missing Authorization CheckSAP Strategic Enterprise ManagementMedium5.4
3716450CVE-2025-68161Potential Improper Certificate ValidationSAP Commerce Cloud (Apache Log4j)Medium4.8
3726583CVE-2026-34258Content Spoofing vulnerabilitySAPUI5 (Search UI)Medium4.7
3728690CVE-2026-27682Reflected Cross-Site Scripting (XSS)SAP NetWeaver Application Server ABAPMedium4.7
3713521CVE-2026-40136Denial of service (DoS)SAP Financial ConsolidationMedium4.3
3718508CVE-2026-40134Missing Authorization CheckSAP Incentive and Commission ManagementMedium4.3
3735359CVE-2026-40129Code Injection vulnerabilitySAP Application Server ABAP for NetWeaverMedium4.3
3726962CVE-2026-40131SQL Injection vulnerabilitySAP HANA Deployment Infrastructure (HDI)Low3.4

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link