Description
An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authenticated administrative user can bypass role restrictions by leveraging permissions from a less sensitive function to execute unauthorized, high-privilege actions. This has a high impact on data integrity, with low impact on confidentiality and no impact on availability of the application.
Published: 2026-02-10
Score: 5.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an erroneous authorization check in SAP Business Workflow that allows a legitimate administrator to bypass role restrictions. The flaw lets an authenticated admin use permissions from a lower‑privilege function to perform higher‑privilege actions, resulting in a high impact on data integrity, a low impact on confidentiality, and no impact on availability. The weakness aligns with the CWE‑862 “Missing Authorization” category.

Affected Systems

Affected: SAP Business Workflow as provided by SAP SE. The list of affected operating environments includes the various SAP Basis versions from 752 to 816 as recorded in the CPE list. No specific version information or build numbers are supplied; the impact is limited to instances of SAP Business Workflow running within those SAP Basis releases.

Risk and Exploitability

CVSS score 5.2 indicates moderate severity. EPSS below 1% indicates a very low but non‑zero probability that this flaw is actively exploited. The vulnerability is not listed in the CISA KEV catalog. The attacker needs to be an authenticated administrator. Based on the description, the attack vector is internal: the exploit requires legitimate credentials and privileged access to the workflow system, with no disclosed public remote exploit. The method involves leveraging a less sensitive function to elevate privileges within the same application session, so exploitation conditions include the presence of the faulty authorization check and an account with administrative rights. As a result, the compromise risk remains moderate but confined to systems where administrative accounts are compromised or misconfigured.

Generated by OpenCVE AI on April 17, 2026 at 20:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the security patch referenced in SAP Note 3710111, which corrects the authentication flaw in SAP Business Workflow.
  • Use SAP Update Manager or other delivery tools to confirm that the latest SAP Basis 752‑816 images contain the fixed code and that all affected modules are updated.
  • After patching, audit workflow roles and permissions to verify that no user who should not have elevated access can invoke the vulnerable function.

Generated by OpenCVE AI on April 17, 2026 at 20:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap sap Basis
CPEs cpe:2.3:a:sap:sap_basis:752:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:753:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:754:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:755:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:756:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:757:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:758:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:816:*:*:*:*:*:*:*
Vendors & Products Sap sap Basis

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap business Workflow
Vendors & Products Sap
Sap business Workflow

Tue, 10 Feb 2026 03:45:00 +0000

Type Values Removed Values Added
Description An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authenticated administrative user can bypass role restrictions by leveraging permissions from a less sensitive function to execute unauthorized, high-privilege actions. This has a high impact on data integrity, with low impact on confidentiality and no impact on availability of the application.
Title Missing authorization check in SAP Business Workflow
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N'}


Subscriptions

Sap Business Workflow Sap Basis
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-02-10T17:17:48.810Z

Reserved: 2026-01-21T22:15:25.361Z

Link: CVE-2026-24312

cve-icon Vulnrichment

Updated: 2026-02-10T17:17:43.512Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T04:16:03.663

Modified: 2026-02-17T15:32:58.490

Link: CVE-2026-24312

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:00:12Z

Weaknesses