[CIAD-2026-0006] Multiple Vulnerabilities in SAP Products

By Published On: February 13, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in SAP Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: High


Software Affected


SAP CRM and SAP S/4HANA (Scripting Editor)

SAP NetWeaver Application Server ABAP and ABAP Platform

SAP Supply Chain Management

SAP Solution Tools Plug-In (ST-PI)

SAP Commerce Cloud

SAP BusinessObjects Business Intelligence Platform

SAP NetWeaver Application Server ABAP and SAP S/4HANA

SAP Document Management System

Business Server Pages Application (TAF_APPLAUNCHER)

SAP NetWeaver Application Server ABAP (applications based on SAP GUI for HTML)

SAP Business One (B1 Client Memory Dump Files)

SAP Business Workflow

ABAP-based SAP systems

SAP BusinessObjects Enterprise (Central Management Console)

SAP NetWeaver (JMS service)

SAP Fiori App (Manage Service Entry Sheets ¿ Lean Services)

SAP Support Tools Plug-In

SAP S/4HANA Defense& Security (Disconnected Operations)

SAP Strategic Enterprise Management (Balanced Scorecard in BSP Application)

SAP NetWeaver Application Server Java

Overview


Multiple vulnerabilities have been reported in SAP products which could allow an attacker to perform code injection, SQL injection, cross-site scripting (XSS) attacks, escalate privileges, execute arbitrary commands, bypass authorization checks, conduct open redirect attacks, exploit race conditions, disclose sensitive information, perform CRLF injection, cause memory corruption, and launch denial of service (DoS) attacks on the targeted system.


Target Audience:

SAP system administrators, SAP security teams, IT infrastructure teams managing SAP landscape, and application developers using affected SAP products and components.


Risk Assessment:

High risk of unauthorized access, data compromise, and potential remote code execution.


Impact Assessment:

Potential remote code execution, data compromise, and system takeover.


Description


Multiple vulnerabilities have been reported in SAP products.


 


Solution


Apply appropriate fixes as mentioned in SAP Security Advisory:   

https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html


Vendor Information


SAP

https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html


References


SAP

https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html


CVE Name

CVE‑2026‑0488

CVE‑2026‑0509

CVE‑2026‑23687

CVE‑2026‑23689

CVE‑2026‑24322

CVE‑2026‑0490

CVE‑2026‑0485

CVE‑2025‑12383

CVE‑2026‑0508

CVE‑2026‑0484

CVE‑2026‑24324

CVE‑2026‑0505

CVE‑2026‑24323

CVE‑2026‑24328

CVE‑2025‑0059

CVE‑2026‑23684

CVE‑2026‑24319

CVE‑2026‑24321

CVE‑2026‑24312

CVE‑2026‑0486

CVE‑2026‑24325

CVE‑2026‑23685

CVE‑2026‑23688

CVE‑2026‑23681

CVE‑2026‑24326

CVE‑2026‑24327

CVE‑2026‑23686

CVE‑2026‑24320

CVE‑2026‑0488

CVE‑2026‑0509

CVE‑2026‑23687

CVE‑2026‑23689

CVE‑2026‑24322

CVE‑2026‑0490

CVE‑2026‑0485

CVE‑2025‑12383

CVE‑2026‑0508

CVE‑2026‑0484

CVE‑2026‑24324

CVE‑2026‑0505

CVE‑2026‑24323

CVE‑2026‑24328

CVE‑2025‑0059

CVE‑2026‑23684

CVE‑2026‑24319

CVE‑2026‑24321

CVE‑2026‑24312

CVE‑2026‑0486

CVE‑2026‑24325

CVE‑2026‑23685

CVE‑2026‑23688

CVE‑2026‑23681

CVE‑2026‑24326

CVE‑2026‑24327

CVE‑2026‑23686

CVE‑2026‑24320




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmPPmwACgkQ3jCgcSdc

ys+S2BAAjyiSHoWBf4Yb6uUkXSQ9wWcJOGrw//MfLmaIcUNwJ/VwoXwRSU6hNklc

W9meFE/YOb3DYNByr9vucSRmOrYQJqRgV1KmX9fYs75aBdDlzJtftJNvY/9HPJUX

cQWG1+dOZwZ+dd7tDLf6sI7Zx1a7LAKwM8CvotR4ofEyOs/yjZ7qlsbhGzyKrxfw

QiuGEM6Bh97PhKNvD9GXj96XhyOtC2Wr84BALyH4iEvALF5uBtdS3LbQnkCgj083

fpAewXC0VmvAJormfR0y1wJHFU6TWPUxfZ2+63KxiqQpoz2o99zhweZM96TdEPRd

56R7I+mXMvCGBkwBzjpUF2PlMon0VRU+lH0Ana0yKcDoh8hFGd72rbnBrZwvie7r

jvF9gXqlo/7na0CJCOXyjE4CusRL/Ncds/RQvD1STPAaLKT87PfNTQbHo4FCUFyZ

ay9y3zipFE38TiMG16afc9j8aPJEyh2BI3/mQadnURvLEudchsoGsfs1QwGyZBfk

cJil/O+crtChLPhp7+zrThM9QSzwW02UZLKGSBkm2tBS8e+jQFRnxgndRvNdco8F

PfyYJ3SdfX/g2MzlRY6jLLj3/Dw9Qe5BALQbGdP7/RJCJIHJtWofyQwV0F4wmwhA

JStbs3vhZZXQUZ+bb0Su9pg5s/qRqZiIb7UZri7eOac+oMsHxZs=

=0uKG

—–END PGP SIGNATURE—–

Share this article