
"The most severe of the resolved vulnerabilities are critical code injection issues in S/4HANA and Commerce that could allow attackers to leak data and execute arbitrary code. Both security defects have a CVSS score of 9.6. Tracked as CVE-2026-34260, the S/4HANA bug is described as an SQL injection issue stemming from missing input validation and sanitization. An authenticated attacker could exploit the weakness to inject malicious SQL statements. The vulnerable code only allows read access to data, and a successful attack would only affect application confidentiality and availability, SAP security firm Onapsis explains."
"The critical SAP Commerce vulnerability, tracked as CVE-2026-34263, is described as a missing authentication check affecting the cloud configuration. "The vulnerability is caused by an overly permissive security configuration with improper rule ordering, allowing an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution," Onapsis explains."
"SAP's fresh round of patches also resolves a high-severity OS command injection flaw in Forecasting & Replenishment. Tracked as CVE-2026-34259, it could allow authenticated attackers to execute arbitrary operating system commands. The remaining 12 security notes released on SAP's May 2026 Security Patch Day address medium and low-severity bugs in NetWeaver, S/4HANA, Business Server Pages Application, BusinessObjects, Strategic Enterprise Management, Commerce Cloud, SAPUI5, Financial Consolidation, Incentive and Commission Management, and the HANA Deployment Infrastructure (HDI) deploy library."
"SAP makes no mention of any of these vulnerabilities being exploited in the wild, but users are advised to apply the patches as soon as possible."
SAP released 15 security notes for May 2026 Security Patch Day. The most severe fixes include critical code injection vulnerabilities in S/4HANA and SAP Commerce with CVSS scores of 9.6. The S/4HANA issue is an SQL injection caused by missing input validation and sanitization, exploitable by an authenticated attacker to inject malicious SQL statements. The vulnerable functionality provides read access, so successful exploitation impacts confidentiality and availability. The SAP Commerce issue is caused by overly permissive cloud security configuration and improper rule ordering, enabling unauthenticated malicious configuration upload and arbitrary server-side code execution. SAP also fixed a high-severity OS command injection flaw in Forecasting & Replenishment. The remaining notes address medium and low-severity issues across multiple SAP products. SAP did not mention active exploitation, and users are advised to apply patches promptly.
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]