SAP

S/4HANA

44 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 14.04.2026 00:07:33
  • Zuletzt bearbeitet 17.04.2026 15:18:16

Due to missing authorization checks in the SAP S/4HANA backend OData Service (Manage Reference Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability has a high impa...

  • EPSS 0.03%
  • Veröffentlicht 14.04.2026 00:07:22
  • Zuletzt bearbeitet 17.04.2026 15:18:16

Due to missing authorization checks in the SAP S/4HANA OData Service (Manage Reference Equipment), an attacker could update and delete child entities via OData services without proper authorization. This vulnerability has a high impact on integrity, ...

  • EPSS 0.04%
  • Veröffentlicht 14.04.2026 00:06:38
  • Zuletzt bearbeitet 17.04.2026 15:18:16

Due to a missing authorization check, SAP S/4HANA (Private Cloud and On-Premise) allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations which could leads to no impact on Confidentiality...

  • EPSS 0.04%
  • Veröffentlicht 24.02.2026 05:23:52
  • Zuletzt bearbeitet 03.03.2026 00:28:43

Under certain conditions SAP S/4HANA (Manage Payment Media) allows an authenticated attacker to access information which would otherwise be restricted. This could cause low impact on confidentiality of the application while integrity and availability...

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 10.02.2026 03:01:08
  • Zuletzt bearbeitet 17.02.2026 16:10:03

An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This l...

  • EPSS 0.01%
  • Veröffentlicht 10.02.2026 03:00:41
  • Zuletzt bearbeitet 17.02.2026 16:12:08

Due to missing authorization check in SAP NetWeaver Application Server ABAP and SAP S/4HANA, an authenticated attacker could access a specific transaction code and modify the text data in the system. This vulnerability has a high impact on integrity ...

  • EPSS 0.07%
  • Veröffentlicht 13.01.2026 01:14:20
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Due to missing authorization check in the SAP ERP Central Component (SAP ECC) and SAP S/4HANA (SAP EHS Management), an attacker could extract hardcoded clear-text credentials and bypass the password authentication check by manipulating user parameter...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 13.01.2026 01:14:05
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Due to insufficient input validation in SAP S/4HANA Private Cloud and On-Premise (Financials General Ledger), an authenticated user could execute crafted SQL queries to read, modify, and delete backend database data. This leads to a high impact on th...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 11.11.2025 00:20:31
  • Zuletzt bearbeitet 15.04.2026 00:35:42

SAP S/4HANA landscape SAP E-Recruiting BSP allows an unauthenticated attacker to craft malicious links, when clicked the victim could be redirected to the page controlled by the attacker. This has low impact on confidentiality and integrity of the ap...

  • EPSS 0.04%
  • Veröffentlicht 14.10.2025 00:18:39
  • Zuletzt bearbeitet 15.04.2026 00:35:42

SAP S/4HANA (Manage Processing Rules - For Bank Statements) allows an authenticated attacker with basic privileges to delete conditions from any shared rule of any user by tampering the request parameter. Due to missing authorization check, the attac...