Description
Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise (Financials General Ledger), an authenticated user could execute crafted SQL queries to read, modify, and delete backend database data. This leads to a high impact on the confidentiality, integrity, and availability of the application.
Published: 2026-01-13
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection allowing authenticated users to read, modify, and delete sensitive financial data, affecting confidentiality, integrity, and availability.
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an SQL injection flaw in SAP S/4HANA Private Cloud and On‑Premise (Financials – General Ledger). Because the application fails to validate input, an authenticated user can inject arbitrary SQL. The attacker could read, alter, or delete backend database records, compromising confidentiality, integrity, and availability of financial data, with system‑wide impact for any user possessing valid credentials.

Affected Systems

SAP's S/4HANA Private Cloud and On‑Premise deployments that use the Financials – General Ledger module are affected. No specific version range is documented in the CNA data, so all installations of these products are potentially vulnerable unless a patch has been applied.

Risk and Exploitability

The CVSS score of 9.9 indicates critical severity, but the EPSS score of less than 1% suggests that exploitation attempts are unlikely at this time. The vulnerability is not listed in KEV, meaning no confirmed active exploits are available. Attackers would need authenticated access to the application and specific knowledge of the database schema to craft effective payloads, which limits the likelihood of successful exploitation despite the high impact of a successful attack.

Generated by OpenCVE AI on April 18, 2026 at 06:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the SAP security patch referenced in SAP Note 3687749 to fix the input validation flaw.
  • Restrict database permissions so that only the least privileged accounts can access critical tables used by General Ledger.
  • Implement input sanitization and use prepared statements for all database queries to prevent injection attacks.

Generated by OpenCVE AI on April 18, 2026 at 06:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap s/4hana
Vendors & Products Sap
Sap s/4hana

Tue, 13 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise (Financials General Ledger), an authenticated user could execute crafted SQL queries to read, modify, and delete backend database data. This leads to a high impact on the confidentiality, integrity, and availability of the application.
Title SQL Injection Vulnerability in SAP S/4HANA Private Cloud and On-Premise (Financials � General Ledger)
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-02-26T15:04:48.911Z

Reserved: 2025-12-09T22:06:42.112Z

Link: CVE-2026-0501

cve-icon Vulnrichment

Updated: 2026-01-13T19:11:35.315Z

cve-icon NVD

Status : Deferred

Published: 2026-01-13T02:15:52.797

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0501

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:00:11Z

Weaknesses