CVE-2025-27436Authorization Bypass Through User-Controlled Key in SE SAP S 4hana

Severity
4.3MEDIUMNVD
EPSS
0.1%
top 75.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 11

Description

The Manage Bank Statements in SAP S/4HANA does not perform required access control checks for an authenticated user to confirm whether a request to interact with a resource is legitimate, allowing the attacker to delete the attachment of a posted bank statement. This leads to a low impact on integrity, with no impact on the confidentiality of the data or the availability of the application.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages1 packages

CVEListV5sap_se/sap_s_4hana108, S4CORE 107+1

🔴Vulnerability Details

2
GHSA
GHSA-fg3j-vgpr-jprw: The Manage Bank Statements in SAP S/4HANA does not perform required access control checks for an authenticated user to confirm whether a request to in2025-03-11
CVEList
Broken Access Control vulnerabilities in SAP S/4HANA (Manage Bank Statements)2025-03-11

📋Vendor Advisories

1
Microsoft
ALSA: usb-audio: Stop parsing channels bits when all channels are found.2024-05-14
CVE-2025-27436 — SAP SE SAP S 4hana vulnerability | cvebase