SAP

S/4hana

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 13.01.2026 01:14:20
  • Zuletzt bearbeitet 13.01.2026 14:03:18

Due to missing authorization check in the SAP ERP Central Component (SAP ECC) and SAP S/4HANA (SAP EHS Management), an attacker could extract hardcoded clear-text credentials and bypass the password authentication check by manipulating user parameter...

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 13.01.2026 01:14:05
  • Zuletzt bearbeitet 13.01.2026 14:03:18

Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise (Financials General Ledger), an authenticated user could execute crafted SQL queries to read, modify, and delete backend database data. This leads to a high impact on th...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 11.11.2025 00:20:31
  • Zuletzt bearbeitet 12.11.2025 16:19:59

SAP S/4HANA landscape SAP E-Recruiting BSP allows an unauthenticated attacker to craft malicious links, when clicked the victim could be redirected to the page controlled by the attacker. This has low impact on confidentiality and integrity of the ap...

  • EPSS 0.04%
  • Veröffentlicht 14.10.2025 00:18:39
  • Zuletzt bearbeitet 14.10.2025 19:36:29

SAP S/4HANA (Manage Processing Rules - For Bank Statements) allows an authenticated attacker with basic privileges to delete conditions from any shared rule of any user by tampering the request parameter. Due to missing authorization check, the attac...

  • EPSS 0.07%
  • Veröffentlicht 09.09.2025 02:15:39
  • Zuletzt bearbeitet 09.09.2025 16:28:43

Due to missing input validation, an attacker with high privilege access to ABAP reports could delete the content of arbitrary database tables, if the tables are not protected by an authorization group. This leads to a high impact on integrity and ava...

Medienbericht
  • EPSS 0.08%
  • Veröffentlicht 12.08.2025 02:09:53
  • Zuletzt bearbeitet 12.08.2025 14:25:33

SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerabilit...

  • EPSS 0.08%
  • Veröffentlicht 12.08.2025 02:07:16
  • Zuletzt bearbeitet 12.08.2025 14:25:33

Due to directory traversal vulnerability in SAP S/4HANA (Bank Communication Management), an attacker with high privileges and access to a specific transaction and method in Bank Communication Management could gain unauthorized access to sensitive ope...

  • EPSS 0.03%
  • Veröffentlicht 12.08.2025 02:04:50
  • Zuletzt bearbeitet 12.08.2025 14:25:33

SAP S/4HANA Supplier invoice is vulnerable to CRLF Injection. An attacker with user-level privileges can bypass the allowlist and insert untrusted sites into the 'Trusted Sites' configuration by injecting line feed (LF) characters into application in...

Medienbericht
  • EPSS 0.49%
  • Veröffentlicht 08.07.2025 00:36:23
  • Zuletzt bearbeitet 08.07.2025 16:18:14

SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with user level privileges to create a new report with his own code potentially gaining full control of the affected SAP system causin...

Medienbericht
  • EPSS 0.13%
  • Veröffentlicht 10.06.2025 00:13:15
  • Zuletzt bearbeitet 12.06.2025 16:06:39

Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the...