Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Home/CyberSecurity News/Critical SAP CRM & S/4HANA Code Injection Security Patch
CyberSecurity News

Critical SAP CRM & S/4HANA Code Injection Security Patch

SAP has released a new batch of security fixes through its February 2026 Security Patch Day. The company urges customers to prioritize these updates, which are vital for reducing exposure across core...

Marcus Rodriguez
Marcus Rodriguez
February 10, 2026 2 Min Read
5 0

SAP has released a new batch of security fixes through its February 2026 Security Patch Day. The company urges customers to prioritize these updates, which are vital for reducing exposure across core enterprise workloads. This latest release encompasses 26 new SAP Security Notes and includes an update to a previously published note.

SAP’s monthly bulletin is a remediation guide for vulnerabilities identified in SAP products, with an explicit recommendation to review the Support Portal and apply patches promptly to protect the SAP landscape.

The highest-risk issue identified is CVE-2026-0488, a code-injection vulnerability in SAP CRM and SAP S/4HANA (Scripting Editor) that allows authenticated, low-privilege users to inject and execute arbitrary code with cross-scope impact, and is associated with SAP Note 3697099 (CVSS 9.9).

From an attack-chain perspective, this class of flaw is especially dangerous in SAP landscapes because it can convert “business user” access into application-layer execution, enabling lateral movement into tightly coupled modules and integrations.

A second critical item, CVE-2026-0509, is a missing authorization check in SAP NetWeaver Application Server ABAP / ABAP Platform that can enable low-privilege authenticated users to bypass authorization controls (SAP Note 3674774; CVSS 9.6).

Among the high-severity set, CVE-2026-23687 (XML Signature Wrapping) in SAP NetWeaver AS ABAP / ABAP Platform is highlighted as a risk for signature-manipulation scenarios that can undermine trust decisions in XML-based flows.

Availability also features prominently: CVE-2026-23689 affects SAP Supply Chain Management and is described as uncontrolled resource consumption, where an authenticated user can repeatedly invoke a remote-enabled function module using an excessively large loop-control parameter, exhausting system resources until the service becomes unavailable.

CVE ID Note # Severity CVSS Product Title
CVE-2026-0488 3697099 Critical 9.9 SAP CRM & S/4HANA (Scripting Editor) Code Injection vulnerability​
CVE-2026-0509 3674774 Critical 9.6 SAP NetWeaver AS ABAP & ABAP Platform Missing Authorization check​
CVE-2026-23687 3697567 High 8.8 SAP NetWeaver AS ABAP & ABAP Platform XML Signature Wrapping​
CVE-2026-23689 3703092 High 7.7 SAP Supply Chain Management Denial of Service (DOS)​
CVE-2026-24322 3705882 High 7.7 SAP Solution Tools Plug-In (ST-PI) Missing Authorization check​
CVE-2026-0490 3654236 High 7.5 SAP BusinessObjects BI Platform Denial of Service (DOS)​
CVE-2026-0485 3678282 High 7.5 SAP BusinessObjects BI Platform Denial of Service (DOS)​
CVE-2025-12383 3692405 High 7.4 SAP Commerce Cloud Race Condition​
CVE-2026-0508 3674246 High 7.3 SAP BusinessObjects BI Platform Open Redirect vulnerability​
CVE-2026-0484 3672622 Medium 6.5 SAP NetWeaver AS ABAP & S/4HANA Missing Authorization check​
CVE-2026-24324 3695912 Medium 6.5 SAP BusinessObjects BI Platform (AdminTools) Denial of Service (DOS)​
CVE-2026-0505, CVE-2026-24323 3678417 Medium 6.1 SAP Document Management System Multiple vulnerabilities in BSP Applications​
CVE-2026-24328 3688319 Medium 6.1 BSP Application (TAF_APPLAUNCHER) Open Redirection vulnerability​
CVE-2025-0059 3503138 Medium 6.0 SAP NetWeaver AS ABAP (SAP GUI for HTML) Information Disclosure (Update to Jan 2025 Note)​
CVE-2026-23684 3689543 Medium 5.9 SAP Commerce Cloud Race condition vulnerability​
CVE-2026-24319 3679346 Medium 5.8 SAP Business One (B1 Client Memory Dump) Information Disclosure Vulnerability​
CVE-2026-24321 3687771 Medium 5.3 SAP Commerce Cloud Information Disclosure vulnerability​
CVE-2026-24312 3710111 Medium 5.2 SAP Business Workflow Missing authorization check​
CVE-2026-0486 3691645 Medium 5.0 ABAP based SAP systems Missing Authorization Check​
CVE-2026-24325 3697256 Medium 4.8 SAP BusinessObjects Enterprise (CMC) Cross-Site Scripting (XSS)​
CVE-2026-23685 3687285 Medium 4.4 SAP NetWeaver (JMS service) Insecure Deserialization​
CVE-2026-23688 3215823 Medium 4.3 SAP Fiori App (Manage Service Entry Sheets) Missing Authorization check​
CVE-2026-23681 3680416 Medium 4.3 SAP Support Tools Plug-In Missing Authorization check in function module​
CVE-2026-24326 3678009 Medium 4.3 SAP S/4HANA Defense & Security Missing authorization check​
CVE-2026-24327 3680390 Medium 4.3 SAP Strategic Ent. Mgmt (Balanced Scorecard) Missing Authorization Check​
CVE-2026-23686 3673213 Low 3.4 SAP NetWeaver AS Java CRLF Injection vulnerability​
CVE-2026-24320 3678313 Low 3.1 SAP NetWeaver & ABAP Platform (AS ABAP) Memory Corruption vulnerability​

The same Patch Day coverage also flags multiple denial-of-service and redirect/XSS-style issues in SAP BusinessObjects BI Platform and related components, reinforcing that externally reachable or user-facing endpoints deserve extra scrutiny during triage.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEPatchSecurityVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

TeamPCP Industrializes Cloud Misconfigurations for Cyber

Next Post

Threat Hunting Misses Real Attacks, Impacts SOC Maturity

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us