Impact
SAP NetWeaver Application Server ABAP and ABAP Platform contain an XML Signature Wrapping flaw that allows an authenticated user with normal privileges to capture a valid signed message, alter it, and send the tampered XML to the verifier. Once accepted, the modified identity information may be used to gain unauthorized access to sensitive data or disrupt normal business processes. The weakness is a classic case of XML signature manipulation and can compromise confidentiality, integrity, and availability of the application.
Affected Systems
The issue affects all SAP Basis releases from 700 to 918 inclusive as listed by the CNA, covering a broad range of SAP NetWeaver ABAP environments. Any system that stores or validates XML signatures within its ABAP platform is potentially vulnerable.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity, while the EPSS score shows a very low current likelihood of exploitation. The flaw is not present in CISA’s KEV catalogue, implying no confirmed exploits yet. Because the attacker must already be authenticated, the threat requires user credentials but does not need additional privileges beyond normal access. The attack vector is likely to be internal exploitation through legitimate user activity, making the vulnerability plausible in environments with weak internal controls.
OpenCVE Enrichment