Description
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability.
Published: 2026-02-10
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Full Database Compromise
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an authenticated user to exploit a flaw in a generic function module call within SAP CRM and SAP S/4HANA’s Scripting Editor, enabling execution of arbitrary SQL statements. This results in a full compromise of the underlying database, causing severe loss of confidentiality, integrity, and availability.

Affected Systems

Affected products include SAP CRM and SAP S/4HANA (Scripting Editor) from SAP. No specific version range is listed in the available data; therefore all releases that contain the Scripting Editor component remain under consideration.

Risk and Exploitability

The flaw carries a CVSS score of 9.9, indicating critical severity. EPSS indicates a low exploitation probability, with a score of less than 1 percent. The vulnerability is not yet listed in the CISA KEV catalog. The attack requires authenticated access to the system, meaning an attacker must possess valid credentials or compromise an existing user account. If exploited, the attacker can gain complete control over the database, elevating the risk dramatically for systems that host sensitive data and rely on the affected components.

Generated by OpenCVE AI on April 17, 2026 at 21:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply SAP Note 3697099 to patch the affected function module.
  • Restrict access to the Scripting Editor and the generic function module to a minimal set of authorized users and roles.
  • Enable detailed logging and monitor for unusual usage patterns or abnormal database queries originating from the Scripting Editor.

Generated by OpenCVE AI on April 17, 2026 at 21:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap netweaver Application Server Abap
Sap s\/4hana
Sap webclient Ui Framework
CPEs cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:102:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:103:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:104:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:105:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:106:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:107:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:108:*:*:*:*:*:*:*
cpe:2.3:a:sap:s\/4hana:109:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:700:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:701:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:730:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:731:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:746:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:747:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:748:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:800:*:*:*:*:*:*:*
cpe:2.3:a:sap:webclient_ui_framework:801:*:*:*:*:*:*:*
Vendors & Products Sap
Sap netweaver Application Server Abap
Sap s\/4hana
Sap webclient Ui Framework

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap Se
Sap Se sap Crm And Sap S/4hana (scripting Editor)
Vendors & Products Sap Se
Sap Se sap Crm And Sap S/4hana (scripting Editor)

Tue, 10 Feb 2026 03:45:00 +0000

Type Values Removed Values Added
Description An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability.
Title Code Injection vulnerability in SAP CRM and SAP S/4HANA (Scripting Editor)
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Sap Netweaver Application Server Abap S\/4hana Webclient Ui Framework
Sap Se Sap Crm And Sap S/4hana (scripting Editor)
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-02-26T15:04:14.152Z

Reserved: 2025-12-09T22:06:31.935Z

Link: CVE-2026-0488

cve-icon Vulnrichment

Updated: 2026-02-10T15:42:53.926Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T04:16:01.710

Modified: 2026-02-17T16:10:03.600

Link: CVE-2026-0488

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:15:27Z

Weaknesses