Description
Due to an Open Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL that, if accessed by a victim, redirects them to an attacker-controlled site.This causes low impact on integrity of the application. Confidentiality and availability are not impacted.
Published: 2026-01-13
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect
Action: Apply Patch
AI Analysis

Impact

An unprivileged user can trigger an Open Redirect by visiting a specially crafted URL in the SAP Supplier Relationship Management SICF Handler that will redirect the victim to an attacker‑controlled site. The vulnerability does not compromise data integrity beyond redirection; confidentiality and availability remain unaffected. The principal risk is that users may be led to phishing or malicious sites, but the attack does not directly alter application data.

Affected Systems

Version 700, 701, 702, 713, and 714 of SAP Supplier Relationship Management (SICF Handler in SRM Catalog) are affected. No detailed sub‑release information is available, but all installations of these major releases should be considered vulnerable until the SAP note 3638716 update is applied.

Risk and Exploitability

With a Base Score of 4.7, the CVSS profile places the issue in the Medium range. The EPSS value is reported as less than 1 % and the vulnerability is not listed in CISA’s KEV catalog, indicating a low probability of exploitation at this time. Based on the description, the likely attack vector is an unauthenticated web request that a user clicks on or follows, leading to the redirection. The exploitation requires only delivery of a crafted URL and does not need credentials or privileged access.

Generated by OpenCVE AI on April 18, 2026 at 06:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the SAP Security Update referenced by SAP Note 3638716 to resolve the open redirect flaw.
  • Test the system after the patch to confirm that URLs no longer redirect to external domains.
  • If the patch cannot be applied immediately, configure the application to reject or sanitize redirects, or whitelist allowed external domains.

Generated by OpenCVE AI on April 18, 2026 at 06:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sap:supplier_relationship_management:700:*:*:*:*:*:*:*
cpe:2.3:a:sap:supplier_relationship_management:701:*:*:*:*:*:*:*
cpe:2.3:a:sap:supplier_relationship_management:702:*:*:*:*:*:*:*
cpe:2.3:a:sap:supplier_relationship_management:713:*:*:*:*:*:*:*
cpe:2.3:a:sap:supplier_relationship_management:714:*:*:*:*:*:*:*

Tue, 13 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap supplier Relationship Management
Vendors & Products Sap
Sap supplier Relationship Management

Tue, 13 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description Due to an Open Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL that, if accessed by a victim, redirects them to an attacker-controlled site.This causes low impact on integrity of the application. Confidentiality and availability are not impacted.
Title Open Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog)
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}


Subscriptions

Sap Supplier Relationship Management
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-01-13T14:40:20.471Z

Reserved: 2025-12-09T22:06:51.573Z

Link: CVE-2026-0513

cve-icon Vulnrichment

Updated: 2026-01-13T14:39:51.565Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T02:15:53.957

Modified: 2026-01-22T18:48:53.343

Link: CVE-2026-0513

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:00:11Z

Weaknesses