Impact
An improperly configured Spring Security component in SAP Commerce cloud permits an unauthenticated user to upload malicious configuration files and inject code, leading to arbitrary server‑side code execution. This flaw, classified as CWE‑459, compromises confidentiality, integrity, and availability of the application, enabling attackers to gain full control of the affected instance.
Affected Systems
Vendors: SAP; Product: SAP Commerce cloud configuration. No specific version ranges are disclosed by the CNA. The vulnerability applies to any deployment of the SAP Commerce cloud configuration that still uses the outdated Spring Security configuration listed in SAP Note 3733064.
Risk and Exploitability
The CVSS score of 9.6 indicates critical severity. EPSS data is unavailable, but the flaw can be exploited by anyone over the network without authentication, making it highly likely to be attacked. The vulnerability is not currently listed in the CISA KEV catalog, but its impact and critical score warrant immediate attention. Attackers can target the configuration upload endpoint directly, upload a malicious payload and trigger arbitrary code execution.
OpenCVE Enrichment