Description
Due to a Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform, an authenticated attacker could send specially crafted inputs to the application. If processed by the application, this input could be delivered to users subscribed to the channel and result in execution. Successful exploitation could enable the attacker to execute arbitrary code for other users, resulting in a low impact on the integrity, with no impact to the confidentiality and availability of the system.
Published: 2026-05-12
Score: 4.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a code injection flaw (CWE‑94) in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform. An attacker who authenticates to the system can craft a payload that the application processes and forwards to users subscribed to a channel. When that payload is delivered, it can be executed, enabling the attacker to run arbitrary code on the accounts of those users. The impact is limited to the integrity of the affected accounts; there is no direct threat to confidentiality or system availability.

Affected Systems

SAP Application Server ABAP for SAP NetWeaver and ABAP Platform are affected. Specific vulnerable versions are not listed in the data; the patch referencing SAP Note 3735359 applies to the impacted releases.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, with no listed KEV exposure and an unavailable EPSS score suggesting limited observed exploitation. The only prerequisite for exploitation is that the attacker authenticates to the SAP system and sends a crafted channel payload. Because the flaw requires legitimate credentials, the likely attack vector is an authenticated user submitting malicious input through the application’s channel interface. As the vulnerability only allows arbitrary code execution for other users and not the authenticated attacker themselves, the overall risk to the system is considered moderate but non‑zero.

Generated by OpenCVE AI on May 12, 2026 at 04:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the security patch referenced in SAP Note 3735359, which fixes the code injection flaw.
  • Restrict channel message submission to trusted users and implement input validation or output encoding for channel payloads to mitigate the risk of code injection until a patch is applied.
  • Implement logging and monitoring of channel messages to detect anomalous or suspicious content.

Generated by OpenCVE AI on May 12, 2026 at 04:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap Se
Sap Se sap Application Server Abap For Sap Netweaver And Abap Platform
Vendors & Products Sap Se
Sap Se sap Application Server Abap For Sap Netweaver And Abap Platform

Tue, 12 May 2026 03:00:00 +0000

Type Values Removed Values Added
Description Due to a Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform, an authenticated attacker could send specially crafted inputs to the application. If processed by the application, this input could be delivered to users subscribed to the channel and result in execution. Successful exploitation could enable the attacker to execute arbitrary code for other users, resulting in a low impact on the integrity, with no impact to the confidentiality and availability of the system.
Title Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Sap Se Sap Application Server Abap For Sap Netweaver And Abap Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-05-12T02:20:45.186Z

Reserved: 2026-04-09T17:29:44.663Z

Link: CVE-2026-40129

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T03:16:11.783

Modified: 2026-05-12T03:16:11.783

Link: CVE-2026-40129

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T09:22:03Z

Weaknesses