Description
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered identity information, unauthorized access to sensitive user data and potential disruption of normal system usage.
Published: 2026-02-10
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Tampered Identity and Unauthorized Data Access
Action: Patch Immediately
AI Analysis

Impact

SAP NetWeaver Application Server ABAP and ABAP Platform contain an XML Signature Wrapping flaw that allows an authenticated user with normal privileges to capture a valid signed message, alter it, and send the tampered XML to the verifier. Once accepted, the modified identity information may be used to gain unauthorized access to sensitive data or disrupt normal business processes. The weakness is a classic case of XML signature manipulation and can compromise confidentiality, integrity, and availability of the application.

Affected Systems

The issue affects all SAP Basis releases from 700 to 918 inclusive as listed by the CNA, covering a broad range of SAP NetWeaver ABAP environments. Any system that stores or validates XML signatures within its ABAP platform is potentially vulnerable.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity, while the EPSS score shows a very low current likelihood of exploitation. The flaw is not present in CISA’s KEV catalogue, implying no confirmed exploits yet. Because the attacker must already be authenticated, the threat requires user credentials but does not need additional privileges beyond normal access. The attack vector is likely to be internal exploitation through legitimate user activity, making the vulnerability plausible in environments with weak internal controls.

Generated by OpenCVE AI on April 18, 2026 at 12:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the SAP Security Note 3697567 to update the SAP NetWeaver ABAP platform to the latest patch level.
  • Configure the system to enforce strict XML signature validation, ensuring that canonicalization is used and that no signature wrapping is permitted.
  • Restrict access to XML documents that carry signed content to authorized roles and monitor audit logs for any unauthorized signature alterations.

Generated by OpenCVE AI on April 18, 2026 at 12:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap sap Basis
CPEs cpe:2.3:a:sap:sap_basis:700:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:701:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:702:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:731:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:740:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:750:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:751:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:752:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:753:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:754:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:755:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:756:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:757:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:758:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:804:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:916:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:917:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:918:*:*:*:*:*:*:*
Vendors & Products Sap
Sap sap Basis

Wed, 11 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap Se
Sap Se sap Netweaver And Abap Platform
Vendors & Products Sap Se
Sap Se sap Netweaver And Abap Platform

Tue, 10 Feb 2026 03:45:00 +0000

Type Values Removed Values Added
Description SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered identity information, unauthorized access to sensitive user data and potential disruption of normal system usage.
Title XML Signature Wrapping in SAP NetWeaver AS ABAP and ABAP Platform
Weaknesses CWE-347
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Sap Sap Basis
Sap Se Sap Netweaver And Abap Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-02-26T15:04:13.585Z

Reserved: 2026-01-14T18:26:17.297Z

Link: CVE-2026-23687

cve-icon Vulnrichment

Updated: 2026-02-10T20:15:21.782Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T04:16:03.180

Modified: 2026-02-17T16:12:35.840

Link: CVE-2026-23687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:00:08Z

Weaknesses