Description
SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability.
Published: 2026-03-10
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Code execution through DLL hijacking
Action: Assess Impact
AI Analysis

Impact

The vulnerability allows an unauthenticated attacker to cause SAP GUI for Windows to load a malicious DLL from any directory within the application. Once the victim uses the application with GuiXT enabled, the DLL is executed in the victim’s user context. The impact on confidentiality, integrity, and availability is low, as the attack is executed only in the victim’s context and does not grant broader system compromise.

Affected Systems

SAP GUI for Windows with active GuiXT is affected. No specific version numbers are provided, so all current deployments of the GUI with GuiXT enabled should be considered vulnerable.

Risk and Exploitability

The CVSS score of 5.0 places the vulnerability in the moderate range, but the probability of exploitation is very low. The issue is not listed in the CISA KEV catalog, suggesting no known widespread active exploitation. The likely attack vector is a social‑engineering scenario in which a user is persuaded to run the application after a malicious DLL has been placed in one of the permitted directories. No privileged escalation or remote access is required beyond the victim’s local workstation.

Generated by OpenCVE AI on April 16, 2026 at 09:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable GuiXT in SAP GUI for Windows if it is not essential for business processes.
  • Apply the latest SAP security update or patch that addresses DLL loading restrictions once it is released.
  • Restrict write permissions on the directories from which SAP GUI can load DLLs, limiting the ability of non‑privileged users to place arbitrary files.
  • Implement monitoring to detect unexpected DLL files in those directories, and configure alerts for any such changes.

Generated by OpenCVE AI on April 16, 2026 at 09:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sap Se
Sap Se sap Gui For Windows With Active Guixt
Vendors & Products Sap Se
Sap Se sap Gui For Windows With Active Guixt

Tue, 10 Mar 2026 00:45:00 +0000

Type Values Removed Values Added
Description SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability.
Title DLL Hijacking vulnerability in SAP GUI for Windows with active GuiXT
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Subscriptions

Sap Se Sap Gui For Windows With Active Guixt
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-03-11T03:56:32.610Z

Reserved: 2026-01-21T22:15:25.361Z

Link: CVE-2026-24317

cve-icon Vulnrichment

Updated: 2026-03-10T15:36:05.638Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-10T17:35:56.040

Modified: 2026-03-11T13:53:47.157

Link: CVE-2026-24317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:00:14Z

Weaknesses