Description
Due to a CRLF Injection vulnerability in SAP NetWeaver Application Server Java, an authenticated attacker with administrative access could submit specially crafted content to the application. If processed by the application, this content enables injection of untrusted entries into generated configuration, allowing manipulation of application-controlled settings. Successful exploitation leads to a low impact on integrity, while confidentiality and availability remain unaffected.
Published: 2026-02-10
Score: 3.4 Low
EPSS: < 1% Very Low
KEV: No
Impact: Low integrity impact via configuration manipulation
Action: Apply Patch
AI Analysis

Impact

An authenticated attacker with administrative privileges can craft content that exploits a CRLF injection flaw in SAP NetWeaver Application Server Java. When this content is processed, the application injects untrusted entries into generated configuration files, allowing manipulation of application-controlled settings. The resulting loss of integrity is limited to configuration data; confidentiality and availability are not affected. This weakness aligns with CWE‑113 and CWE‑436.

Affected Systems

SAP NetWeaver Application Server Java version 7.50 is affected. No other versions are listed in the CNA data.

Risk and Exploitability

The CVSS score of 3.4 indicates a low severity rating, while the EPSS score of less than 1% reflects an extremely low likelihood of exploitation. The vulnerability is not cataloged in the CISA KEV list. Exploitation requires authenticated administrative access and does not pose a remote threat. Given that privileged accounts can be more frequently targeted, organizations should consider immediate remediation to prevent potential configuration abuse.

Generated by OpenCVE AI on April 17, 2026 at 20:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the fix provided in SAP Note 3673213
  • Restrict administrative privileges and enforce least‑privilege principles for users who can submit configuration content
  • Monitor configuration files for unexpected changes and audit audit logs for suspicious CRLF injection attempts

Generated by OpenCVE AI on April 17, 2026 at 20:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sap netweaver Application Server Java
Weaknesses CWE-436
CPEs cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*
Vendors & Products Sap netweaver Application Server Java

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap sap Netweaver Application Server Java
Vendors & Products Sap
Sap sap Netweaver Application Server Java

Tue, 10 Feb 2026 03:45:00 +0000

Type Values Removed Values Added
Description Due to a CRLF Injection vulnerability in SAP NetWeaver Application Server Java, an authenticated attacker with administrative access could submit specially crafted content to the application. If processed by the application, this content enables injection of untrusted entries into generated configuration, allowing manipulation of application-controlled settings. Successful exploitation leads to a low impact on integrity, while confidentiality and availability remain unaffected.
Title CRLF Injection vulnerability in SAP NetWeaver Application Server Java
Weaknesses CWE-113
References
Metrics cvssV3_1

{'score': 3.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N'}


Subscriptions

Sap Netweaver Application Server Java Sap Netweaver Application Server Java
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-02-10T17:19:05.865Z

Reserved: 2026-01-14T18:26:17.297Z

Link: CVE-2026-23686

cve-icon Vulnrichment

Updated: 2026-02-10T17:19:01.055Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T04:16:03.013

Modified: 2026-02-17T16:03:09.107

Link: CVE-2026-23686

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:00:12Z

Weaknesses