Description
Due to insufficient validation of user-controlled input in the URLs query parameter. SAP Business One Job Service could allow an unauthenticated attacker to inject specially crafted input which upon user interaction could result in a DOM-based Cross-Site Scripting (XSS) vulnerability. This issue had a low impact on the confidentiality and integrity of the application with no impact on availability.
Published: 2026-03-10
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

The SAP Business One Job Service contains a DOM‑based Cross‑Site Scripting flaw caused by insufficient validation of user‑controlled input in a URL query parameter. An unauthenticated attacker can inject specially crafted data that will be processed when a user interacts with the affected page, potentially leading to the execution of malicious scripts in the victim’s browser session. The vulnerability is classified as CWE‑79, and the impact is limited to confidentiality and integrity via the compromise of session state, with no effect on availability.

Affected Systems

The affected product is SAP Business One Job Service. No specific version information is available in the advisory; administrators should verify the presence of the flaw against their deployed instances.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate severity, reflecting the requirement of user interaction and the lack of direct remote code execution. The EPSS score of less than 1% suggests a low probability of exploitation at present, and the vulnerability is not listed in CISA's catalog of known exploited vulnerabilities. The likely attack vector requires an unauthenticated attacker to craft a malicious URL that a user opens; the attacker cannot compromise the system without a victim’s interaction. Based on the provided data, continuous monitoring for the release of a vendor patch remains prudent.

Generated by OpenCVE AI on April 17, 2026 at 11:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest SAP Business One Job Service security patch as distributed by SAP (see SAP Note 3693543 or the official SAP security patch day releases).
  • Ensure that all URL query parameters are properly sanitized and that stored or reflected values are escaped before being embedded in the DOM.
  • Restrict or disable unauthenticated access to the Job Service endpoint where feasible, or enforce role‑based access controls to limit exposure.

Generated by OpenCVE AI on April 17, 2026 at 11:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sap Se
Sap Se sap Business One (job Service)
Vendors & Products Sap Se
Sap Se sap Business One (job Service)

Tue, 10 Mar 2026 00:45:00 +0000

Type Values Removed Values Added
Description Due to insufficient validation of user-controlled input in the URLs query parameter. SAP Business One Job Service could allow an unauthenticated attacker to inject specially crafted input which upon user interaction could result in a DOM-based Cross-Site Scripting (XSS) vulnerability. This issue had a low impact on the confidentiality and integrity of the application with no impact on availability.
Title DOM-based Cross-Site Scripting (XSS) Vulnerability in SAP Business One (Job Service)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Sap Se Sap Business One (job Service)
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-03-10T16:53:45.896Z

Reserved: 2025-12-09T22:06:32.759Z

Link: CVE-2026-0489

cve-icon Vulnrichment

Updated: 2026-03-10T15:36:16.863Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-10T17:31:05.073

Modified: 2026-03-11T13:53:47.157

Link: CVE-2026-0489

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:00:11Z

Weaknesses