Sap Se Sap Business One vulnerabilities

31 known vulnerabilities affecting sap_se/sap_business_one.

Total CVEs
31
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH12MEDIUM18

Vulnerabilities

Page 1 of 2
CVE-2026-0489MEDIUMCVSS 6.1vB1_ON_HANA 10.0vSAP-M-BO 10.02026-03-10
CVE-2026-0489 [MEDIUM] CWE-79 CVE-2026-0489: Due to insufficient validation of user-controlled input in the URLs query parameter. SAP Business On Due to insufficient validation of user-controlled input in the URLs query parameter. SAP Business One Job Service could allow an unauthenticated attacker to inject specially crafted input which upon user interaction could result in a DOM-based Cross-Site Scripting (XSS) vulnerability. This issue had a low impact on the confidentiality and integrity of
cvelistv5nvd
CVE-2026-24319MEDIUMCVSS 5.8vB1_ON_HANA 10.0vSAP-M-BO 10.02026-02-10
CVE-2026-24319 [MEDIUM] CWE-316 CVE-2026-24319: In SAP Business One, sensitive information is written to the application�s memory dump files without In SAP Business One, sensitive information is written to the application�s memory dump files without obfuscation. Gaining access to this information could potentially lead to unauthorized operations within the B1 environment, including modification of company data. This issue results in a high impact on confidentiality and integrity, with no impact
cvelistv5nvd
CVE-2025-42897MEDIUMCVSS 5.3vB1_ON_HANA 10.0vSAP-M-BO 10.02025-11-11
CVE-2025-42897 [MEDIUM] CWE-522 CVE-2025-42897: Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an attacker with normal user access could gain access to unauthorized information. As a result, it has a low impact on the confidentiality of the application but no impact on the integrity and availability.
cvelistv5nvd
CVE-2025-42933HIGHCVSS 8.8vB1_ON_HANA 10.0vSAP-M-BO 10.02025-09-09
CVE-2025-42933 [HIGH] CWE-522 CVE-2025-42933: When a user logs in via SAP Business One native client, the SLD backend service fails to enforce pro When a user logs in via SAP Business One native client, the SLD backend service fails to enforce proper encryption of certain APIs. This leads to exposure of sensitive credentials within http response body. As a result, it has a high impact on the confidentiality, integrity, and availability of the application.
cvelistv5nvd
CVE-2025-42951HIGHCVSS 8.8vB1_ON_HANA 10.0vSAP-M-BO 10.02025-08-12
CVE-2025-42951 [HIGH] CWE-863 CVE-2025-42951: Due to broken authorization, SAP Business One (SLD) allows an authenticated attacker to gain adminis Due to broken authorization, SAP Business One (SLD) allows an authenticated attacker to gain administrator privileges of a database by invoking the corresponding API.�As a result , it has a high impact on the confidentiality, integrity, and availability of the application.
cvelistv5nvd
CVE-2025-26658MEDIUMCVSS 6.8vB1_ON_HANA 10.0vSAP-M-BO 10.02025-03-11
CVE-2025-26658 [MEDIUM] CWE-384 CVE-2025-26658: The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of o
cvelistv5nvd
CVE-2023-31403HIGHCVSS 8.0v10.02023-11-14
CVE-2023-31403 [HIGH] CWE-863 CVE-2023-31403: SAP Business One installation - version 10.0, does not perform proper authentication and authorizati SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality,
cvelistv5nvd
CVE-2023-41365MEDIUMCVSS 4.3v10.02023-10-10
CVE-2023-41365 [MEDIUM] CWE-611 CVE-2023-41365: SAP Business One (B1i) - version 10.0, allows an authorized attacker to retrieve the details stack t SAP Business One (B1i) - version 10.0, allows an authorized attacker to retrieve the details stack trace of the fault message to conduct the XXE injection, which will lead to information disclosure. After successful exploitation, an attacker can cause limited impact on the confidentiality and no impact to the integrity and availability.
cvelistv5nvd
CVE-2023-33993HIGHCVSS 7.5v10.02023-08-08
CVE-2023-33993 [HIGH] CWE-89 CVE-2023-33993: B1i module of SAP Business One - version 10.0, application allows an authenticated user with deep kn B1i module of SAP Business One - version 10.0, application allows an authenticated user with deep knowledge to send crafted queries over the network to read or modify the SQL data. On successful exploitation, the attacker can cause high impact on confidentiality, integrity and availability of the application.
cvelistv5nvd
CVE-2023-37487MEDIUMCVSS 5.3v10.02023-08-08
CVE-2023-37487 [MEDIUM] CWE-497 CVE-2023-37487: SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledg SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledge perform certain operation to access unintended data over the network which could lead to high impact on confidentiality with no impact on integrity and availability of the application
cvelistv5nvd
CVE-2023-39437MEDIUMCVSS 5.4v10.02023-08-08
CVE-2023-39437 [MEDIUM] CWE-79 CVE-2023-39437: SAP business One allows - version 10.0, allows an attacker to insert malicious code into the content SAP business One allows - version 10.0, allows an attacker to insert malicious code into the content of a web page or application and gets it delivered to the client, resulting to Cross-site scripting. This could lead to harmful action affecting the Confidentiality, Integrity and Availability of the application.
cvelistv5nvd
CVE-2022-35292HIGHCVSS 7.8v10.02022-09-13
CVE-2022-35292 [HIGH] CWE-428 CVE-2022-35292: In SAP Business One application when a service is created, the executable path contains spaces and i In SAP Business One application when a service is created, the executable path contains spaces and isn’t enclosed within quotes, leading to a vulnerability known as Unquoted Service Path which allows a user to gain SYSTEM privileges. If the service is exploited by adversaries, it can be used to gain privileged permissions on a system or network leadin
cvelistv5nvd
CVE-2022-32249HIGHCVSS 7.5v10.02022-07-12
CVE-2022-32249 [HIGH] CWE-668 CVE-2022-32249: Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can exploit HANA cockpit�s data volume to gain access to highly sensitive information (e.g., high privileged account credentials)
cvelistv5nvd
CVE-2022-35168HIGHCVSS 7.5v10.02022-07-12
CVE-2022-35168 [HIGH] CWE-611 CVE-2022-35168: Due to improper input sanitization of XML input in SAP Business One - version 10.0, an attacker can Due to improper input sanitization of XML input in SAP Business One - version 10.0, an attacker can perform a denial-of-service attack rendering the system temporarily inoperative.
cvelistv5nvd
CVE-2022-31593HIGHCVSS 8.8v10.02022-07-12
CVE-2022-31593 [HIGH] CWE-74 CVE-2022-31593: SAP Business One client - version 10.0 allows an attacker with low privileges, to inject code that c SAP Business One client - version 10.0 allows an attacker with low privileges, to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
cvelistv5nvd
CVE-2021-44234MEDIUMCVSS 5.5fixed in 10.02022-01-14
CVE-2021-44234 [MEDIUM] CWE-532 CVE-2021-44234: SAP Business One - version 10.0, extended log stores information that can be of a sensitive nature a SAP Business One - version 10.0, extended log stores information that can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.
cvelistv5nvd
CVE-2021-42066MEDIUMCVSS 4.4fixed in 10.02021-12-14
CVE-2021-42066 [MEDIUM] CWE-312 CVE-2021-42066: SAP Business One - version 10.0, allows an admin user to view DB password in plain text over the net SAP Business One - version 10.0, allows an admin user to view DB password in plain text over the network, which should otherwise be encrypted. For an attacker to discover vulnerable function in-depth application knowledge is required, but once exploited the attacker may be able to completely compromise confidentiality, integrity, and availability of
cvelistv5nvd
CVE-2021-38180CRITICALCVSS 9.8fixed in 10.02021-10-12
CVE-2021-38180 [CRITICAL] CWE-1236 CVE-2021-38180: SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only if the victim allows to execute macros while opening the file and the security settings of Exce
cvelistv5nvd
CVE-2021-38179MEDIUMCVSS 4.9fixed in 10.02021-10-12
CVE-2021-38179 [MEDIUM] CVE-2021-38179: Debug function of Admin UI of SAP Business One Integration is enabled by default. This allows Admin Debug function of Admin UI of SAP Business One Integration is enabled by default. This allows Admin User to see the captured packet contents which may include User credentials.
cvelistv5nvd
CVE-2021-33704HIGHCVSS 8.8fixed in 10.02021-09-15
CVE-2021-33704 [HIGH] CWE-862 CVE-2021-33704: The Service Layer of SAP Business One, version - 10.0, allows an authenticated attacker to invoke ce The Service Layer of SAP Business One, version - 10.0, allows an authenticated attacker to invoke certain functions that would otherwise be restricted to specific users. For an attacker to discover the vulnerable function, no in-depth system knowledge is required. Once exploited via Network stack, the attacker may be able to read, modify or delete res
cvelistv5nvd