SAP Security Patch Day – Critical Code Injection Vulnerability Fixed in SAP CRM and SAP S/4HANA


SAP Security Patch Day Fixed SAP CRM and SAP S/4HANA

SAP’s February 2026 Security Patch Day delivered fixes that SAP urges customers to prioritize to reduce exposure across core enterprise workloads. The release includes 26 new SAP Security Notes and one update to a previously published note.

SAP’s monthly bulletin is a remediation guide for vulnerabilities identified in SAP products, with an explicit recommendation to review the Support Portal and apply patches promptly to protect the SAP landscape.

The highest-risk issue identified is CVE-2026-0488, a code-injection vulnerability in SAP CRM and SAP S/4HANA (Scripting Editor) that allows authenticated, low-privilege users to inject and execute arbitrary code with cross-scope impact, and is associated with SAP Note 3697099 (CVSS 9.9).

From an attack-chain perspective, this class of flaw is especially dangerous in SAP landscapes because it can convert “business user” access into application-layer execution, enabling lateral movement into tightly coupled modules and integrations.

A second critical item, CVE-2026-0509, is a missing authorization check in SAP NetWeaver Application Server ABAP / ABAP Platform that can enable low-privilege authenticated users to bypass authorization controls (SAP Note 3674774; CVSS 9.6).

Among the high-severity set, CVE-2026-23687 (XML Signature Wrapping) in SAP NetWeaver AS ABAP / ABAP Platform is highlighted as a risk for signature-manipulation scenarios that can undermine trust decisions in XML-based flows.

google

Availability also features prominently: CVE-2026-23689 affects SAP Supply Chain Management and is described as uncontrolled resource consumption, where an authenticated user can repeatedly invoke a remote-enabled function module using an excessively large loop-control parameter, exhausting system resources until the service becomes unavailable.

CVE IDNote #SeverityCVSSProductTitle
CVE-2026-04883697099Critical9.9SAP CRM & S/4HANA (Scripting Editor)Code Injection vulnerability​
CVE-2026-05093674774Critical9.6SAP NetWeaver AS ABAP & ABAP PlatformMissing Authorization check​
CVE-2026-236873697567High8.8SAP NetWeaver AS ABAP & ABAP PlatformXML Signature Wrapping​
CVE-2026-236893703092High7.7SAP Supply Chain ManagementDenial of Service (DOS)​
CVE-2026-243223705882High7.7SAP Solution Tools Plug-In (ST-PI)Missing Authorization check​
CVE-2026-04903654236High7.5SAP BusinessObjects BI PlatformDenial of Service (DOS)​
CVE-2026-04853678282High7.5SAP BusinessObjects BI PlatformDenial of Service (DOS)​
CVE-2025-123833692405High7.4SAP Commerce CloudRace Condition​
CVE-2026-05083674246High7.3SAP BusinessObjects BI PlatformOpen Redirect vulnerability​
CVE-2026-04843672622Medium6.5SAP NetWeaver AS ABAP & S/4HANAMissing Authorization check​
CVE-2026-243243695912Medium6.5SAP BusinessObjects BI Platform (AdminTools)Denial of Service (DOS)​
CVE-2026-0505, CVE-2026-243233678417Medium6.1SAP Document Management SystemMultiple vulnerabilities in BSP Applications​
CVE-2026-243283688319Medium6.1BSP Application (TAF_APPLAUNCHER)Open Redirection vulnerability​
CVE-2025-00593503138Medium6.0SAP NetWeaver AS ABAP (SAP GUI for HTML)Information Disclosure (Update to Jan 2025 Note)​
CVE-2026-236843689543Medium5.9SAP Commerce CloudRace condition vulnerability​
CVE-2026-243193679346Medium5.8SAP Business One (B1 Client Memory Dump)Information Disclosure Vulnerability​
CVE-2026-243213687771Medium5.3SAP Commerce CloudInformation Disclosure vulnerability​
CVE-2026-243123710111Medium5.2SAP Business WorkflowMissing authorization check​
CVE-2026-04863691645Medium5.0ABAP based SAP systemsMissing Authorization Check​
CVE-2026-243253697256Medium4.8SAP BusinessObjects Enterprise (CMC)Cross-Site Scripting (XSS)​
CVE-2026-236853687285Medium4.4SAP NetWeaver (JMS service)Insecure Deserialization​
CVE-2026-236883215823Medium4.3SAP Fiori App (Manage Service Entry Sheets)Missing Authorization check​
CVE-2026-236813680416Medium4.3SAP Support Tools Plug-InMissing Authorization check in function module​
CVE-2026-243263678009Medium4.3SAP S/4HANA Defense & SecurityMissing authorization check​
CVE-2026-243273680390Medium4.3SAP Strategic Ent. Mgmt (Balanced Scorecard)Missing Authorization Check​
CVE-2026-236863673213Low3.4SAP NetWeaver AS JavaCRLF Injection vulnerability​
CVE-2026-243203678313Low3.1SAP NetWeaver & ABAP Platform (AS ABAP)Memory Corruption vulnerability​

The same Patch Day coverage also flags multiple denial-of-service and redirect/XSS-style issues in SAP BusinessObjects BI Platform and related components, reinforcing that externally reachable or user-facing endpoints deserve extra scrutiny during triage.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link