Sap Se Sap S 4Hana vulnerabilities

30 known vulnerabilities affecting sap_se/sap_s_4hana.

Total CVEs
30
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH6MEDIUM21

Vulnerabilities

Page 1 of 2
CVE-2026-27673MEDIUMCVSS 4.9vS4CORE 105v106+7 more2026-04-14
CVE-2026-27673 [MEDIUM] CWE-862 CVE-2026-27673: Due to a missing authorization check, SAP S/4HANA (Private Cloud and On-Premise) allows an authentic Due to a missing authorization check, SAP S/4HANA (Private Cloud and On-Premise) allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations which could leads to no impact on Confidentiality, Low impact on Integrity and Availability of the application.
cvelistv5nvd
CVE-2026-0498HIGHCVSS 7.2vS4CORE 102v103+6 more2026-01-13
CVE-2026-0498 [HIGH] CWE-94 CVE-2026-0498: SAP S/4HANA (Private Cloud and On-Premise) allows an attacker with admin privileges to exploit a vul SAP S/4HANA (Private Cloud and On-Premise) allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code/OS commands into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of fu
cvelistv5nvd
CVE-2025-42939MEDIUMCVSS 4.3vS4CORE 104v105+4 more2025-10-14
CVE-2025-42939 [MEDIUM] CWE-863 CVE-2025-42939: SAP S/4HANA (Manage Processing Rules - For Bank Statements) allows an authenticated attacker with ba SAP S/4HANA (Manage Processing Rules - For Bank Statements) allows an authenticated attacker with basic privileges to delete conditions from any shared rule of any user by tampering the request parameter. Due to missing authorization check, the attacker can delete shared rule conditions that should be restricted, compromising the integrity of the ap
cvelistv5nvd
CVE-2025-42916HIGHCVSS 8.1vS4CORE 102v103+5 more2025-09-09
CVE-2025-42916 [HIGH] CWE-1287 CVE-2025-42916: Due to missing input validation, an attacker with high privilege access to ABAP reports could delete Due to missing input validation, an attacker with high privilege access to ABAP reports could delete the content of arbitrary database tables, if the tables are not protected by an authorization group. This leads to a high impact on integrity and availability of the database but no impact on confidentiality.
cvelistv5nvd
CVE-2025-42957CRITICALCVSS 9.9vS4CORE 102v103+5 more2025-08-12
CVE-2025-42957 [CRITICAL] CWE-94 CVE-2025-42957: SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function modul SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the
cvelistv5nvd
CVE-2025-42934MEDIUMCVSS 4.3vS4CORE 102v103+6 more2025-08-12
CVE-2025-42934 [MEDIUM] CWE-113 CVE-2025-42934: SAP S/4HANA Supplier invoice is vulnerable to CRLF Injection. An attacker with user-level privileges SAP S/4HANA Supplier invoice is vulnerable to CRLF Injection. An attacker with user-level privileges can bypass the allowlist and insert untrusted sites into the 'Trusted Sites' configuration by injecting line feed (LF) characters into application inputs. This vulnerability has a low impact on the application's integrity and no impact on confidentia
cvelistv5nvd
CVE-2025-42946MEDIUMCVSS 6.9vSAP_APPL 606vSAP_FIN 617+10 more2025-08-12
CVE-2025-42946 [MEDIUM] CWE-22 CVE-2025-42946: Due to directory traversal vulnerability in SAP S/4HANA (Bank Communication Management), an attacker Due to directory traversal vulnerability in SAP S/4HANA (Bank Communication Management), an attacker with high privileges and access to a specific transaction and method in Bank Communication Management could gain unauthorized access to sensitive operating system files. This could allow the attacker to potentially read or delete these files hence cau
cvelistv5nvd
CVE-2025-42991MEDIUMCVSS 4.3vS4CORE 1082025-06-10
CVE-2025-42991 [MEDIUM] CWE-862 CVE-2025-42991: SAP S/4HANA (Bank Account Application) does not perform necessary authorization checks. This allows SAP S/4HANA (Bank Account Application) does not perform necessary authorization checks. This allows an authenticated 'approver' user to delete attachment from bank account application of other user, leading to a low impact on integrity, with no impact on the confidentiality of the data or the availability of the application.
cvelistv5nvd
CVE-2025-42984MEDIUMCVSS 5.4vS4CORE 106v107+1 more2025-06-10
CVE-2025-42984 [MEDIUM] CWE-862 CVE-2025-42984: SAP S/4HANA Manage Central Purchase Contract does not perform necessary authorization checks for an SAP S/4HANA Manage Central Purchase Contract does not perform necessary authorization checks for an authenticated user. Due to this, an attacker could execute the function import on the entity making it inaccessible for unrestricted user. This has low impact on confidentiality and availability of the application.
cvelistv5nvd
CVE-2025-42987MEDIUMCVSS 4.3vS4CORE 104v105+3 more2025-06-10
CVE-2025-42987 [MEDIUM] CWE-862 CVE-2025-42987: SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit sh SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing authorization check, the attacker can edit rules that should be restricted, compromising the integrity of the application.
cvelistv5nvd
CVE-2025-42993MEDIUMCVSS 6.7vSAP_GWFND 757v7582025-06-10
CVE-2025-42993 [MEDIUM] CWE-862 CVE-2025-42993: Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the attacker to consume events via the RFC destination, leading to code execution under the privileges of
cvelistv5nvd
CVE-2025-43003MEDIUMCVSS 6.4vS4CRM 204v205+7 more2025-05-13
CVE-2025-43003 [MEDIUM] CWE-749 CVE-2025-43003: SAP S/4 HANA allows an authenticated attacker with user privileges to configure a field not intended SAP S/4 HANA allows an authenticated attacker with user privileges to configure a field not intended for their access and create a custom UI layout displaying this field. On performing this step the attacker could gain access to highly sensitive information. This could cause a high impact on confidentiality and minimal impact on integrity and availa
cvelistv5nvd
CVE-2025-27429CRITICALCVSS 9.9vS4CORE 102v103+5 more2025-04-08
CVE-2025-27429 [CRITICAL] CWE-94 CVE-2025-27429: SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function modul SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the
cvelistv5nvd
CVE-2025-27433MEDIUMCVSS 4.3vS4CORE 107v1082025-03-11
CVE-2025-27433 [MEDIUM] CWE-639 CVE-2025-27433: The Manage Bank Statements in SAP S/4HANA allows authenticated attacker to bypass certain functional The Manage Bank Statements in SAP S/4HANA allows authenticated attacker to bypass certain functionality restrictions of the application and upload files to a reversed bank statement. This vulnerability has a low impact on the application's integrity, with no effect on confidentiality and availability of the application.
cvelistv5nvd
CVE-2025-23188MEDIUMCVSS 4.3vS4CORE 102v103+7 more2025-03-11
CVE-2025-23188 [MEDIUM] CWE-862 CVE-2025-23188: An authenticated user with low privileges can exploit a missing authorization check in an IBS module An authenticated user with low privileges can exploit a missing authorization check in an IBS module of FS-RBD, allowing unauthorized access to perform actions beyond their intended permissions. This causes a low impact on integrity with no impact on confidentiality and availability.
cvelistv5nvd
CVE-2025-27436MEDIUMCVSS 4.3vS4CORE 107v1082025-03-11
CVE-2025-27436 [MEDIUM] CWE-639 CVE-2025-27436: The Manage Bank Statements in SAP S/4HANA does not perform required access control checks for an aut The Manage Bank Statements in SAP S/4HANA does not perform required access control checks for an authenticated user to confirm whether a request to interact with a resource is legitimate, allowing the attacker to delete the attachment of a posted bank statement. This leads to a low impact on integrity, with no impact on the confidentiality of the da
cvelistv5nvd
CVE-2024-34691MEDIUMCVSS 6.5vS4CORE 102v103+5 more2024-06-11
CVE-2024-34691 [MEDIUM] CWE-862 CVE-2024-34691: Manage Incoming Payment Files (F1680) of SAP S/4HANA does not perform necessary authorization checks Manage Incoming Payment Files (F1680) of SAP S/4HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. As a result, it has high impact on integrity and no impact on the confidentiality and availability of the system.
cvelistv5nvd
CVE-2024-33002MEDIUMCVSS 6.1vSAP_BASIS 740vSAP_BASIS 750+8 more2024-05-14
CVE-2024-33002 [MEDIUM] CWE-79 CVE-2024-33002: Document Service handler (obsolete) in Data Provisioning Service does not sufficiently encode user-c Document Service handler (obsolete) in Data Provisioning Service does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability with low impact on Confidentiality and Integrity of the application.
cvelistv5nvd
CVE-2023-41369MEDIUMCVSS 4.3v100v101+7 more2023-09-12
CVE-2023-41369 [MEDIUM] CWE-611 CVE-2023-41369: The Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, 105, 106, 1 The Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, 105, 106, 107, 108, allows an attacker to upload the XML file as an attachment. When clicked on the XML file in the attachment section, the file gets opened in the browser to cause the entity loops to slow down the browser.
cvelistv5nvd
CVE-2023-40306MEDIUMCVSS 6.1v103v104+2 more2023-09-08
CVE-2023-40306 [MEDIUM] CWE-601 CVE-2023-40306: SAP S/4HANA Manage Catalog Items and Cross-Catalog searches Fiori apps allow an attacker to redirect SAP S/4HANA Manage Catalog Items and Cross-Catalog searches Fiori apps allow an attacker to redirect users to a malicious site due to insufficient URL validation. As a result, it may have a slight impact on confidentiality and integrity.
cvelistv5nvd