SAP Security Patch Day January 2026 Addresses Critical Injection and RCE Vulnerabilities

SAP released 17 new security notes on January 13, 2026, fixing critical vulnerabilities across widely deployed enterprise systems.

The patch day includes four critical-severity flaws, including SQL injection, remote code execution, and code injection, that can compromise SAP environments via both authenticated and unauthenticated attack vectors.

Critical Vulnerabilities Requiring Immediate Remediation

The January patch cycle addresses several severe vulnerabilities targeting SAP’s core infrastructure.

CVE-2026-0501 is the highest-severity flaw: a SQL injection vulnerability in SAP S/4HANA’s General Ledger module, with a CVSS score of 9.9.

This vulnerability allows authenticated attackers to execute arbitrary SQL queries, directly compromising the integrity of financial data across S4CORE versions 102 through 109 in both private cloud and on-premise environments.

A critical remote code execution vulnerability in SAP Wily Introscope Enterprise Manager (CVE-2026-0500, CVSS 9.6) requires only minimal user interaction to trigger exploitation.

This flaw enables attackers to gain system-level access without authentication, presenting a substantial risk to enterprise monitoring infrastructure in version 10.8 deployments.

Code injection vulnerabilities have been reported in both SAP S/4HANA (CVE-2026-0498, CVSS 9.1) and SAP Landscape Transformation (CVE-2026-0491, CVSS 9.1), though both require high-privilege authentication.

The HANA privilege escalation vulnerability (CVE-2026-0492, CVSS 8.8) and OS command injection in Application Server components (CVE-2026-0507, CVSS 8.4) complete the high-severity threat landscape.

CVE IDVulnerability TypeAffected ProductCVSS ScoreSeverity
CVE-2026-0501SQL InjectionSAP S/4HANA (General Ledger)9.9Critical
CVE-2026-0500Remote Code ExecutionSAP Wily Introscope Enterprise Manager9.6Critical
CVE-2026-0498Code InjectionSAP S/4HANA (Private Cloud/On-Premise)9.1Critical
CVE-2026-0491Code InjectionSAP Landscape Transformation9.1Critical
CVE-2026-0492Privilege EscalationSAP HANA Database8.8High
CVE-2026-0507OS Command InjectionSAP Application Server ABAP/NetWeaver RFCSDK8.4High
CVE-2026-0511Multiple VulnerabilitiesSAP Fiori App (Intercompany Balance Reconciliation)8.1High
CVE-2026-0506Missing Authorization CheckSAP NetWeaver Application Server ABAP8.1High
CVE-2026-0503Missing Authorization CheckSAP ERP/S/4HANA (EHS Management)6.4Medium
CVE-2026-0499Cross-Site Scripting (XSS)SAP NetWeaver Enterprise Portal6.1Medium
CVE-2026-0514Cross-Site Scripting (XSS)SAP Business Connector6.1Medium
CVE-2026-0513Open RedirectSAP Supplier Relationship Management4.7Medium
CVE-2026-0494Information DisclosureSAP Fiori App (Intercompany Balance Reconciliation)4.3Medium
CVE-2026-0493Cross-Site Request Forgery (CSRF)SAP Fiori App (Intercompany Balance Reconciliation)4.3Medium
CVE-2026-0497Missing Authorization CheckBusiness Server Pages Application4.3Medium
CVE-2026-0504Insufficient Input HandlingSAP Identity Management3.8Low
CVE-2026-0510Obsolete Encryption AlgorithmNW AS Java UME User Mapping3.0Low

Beyond the critical flaws, the patch cycle addresses multiple authorization-bypass vulnerabilities across NetWeaver Application Server (CVE-2026-0506, CVSS 8.1) and EHS Management systems (CVE-2026-0503, CVSS 6.4).

These authorization weaknesses could facilitate privilege escalation through authenticated access pathways.

Application-level vulnerabilities include cross-site scripting flaws in Enterprise Portal (CVE-2026-0499, CVSS 6.1) and Business Connector (CVE-2026-0514, CVSS 6.1), as well as cross-site request forgery affecting the Fiori Intercompany Balance Reconciliation app (CVE-2026-0493, CVSS 4.3).

Lower-severity vulnerabilities encompassing information disclosure, open redirects, and deprecated encryption implementations complete the vulnerability set.

SAP strongly recommends prioritizing patches addressing critical-severity vulnerabilities, particularly those affecting S/4HANA and Wily Introscope environments.

Organizations should consult SAP’s support portal for patch availability and deployment guidance tailored to their specific installed versions and system configurations.

Rapid remediation of these vulnerabilities is essential given their potential impact on core enterprise financial and monitoring systems.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post SAP Security Patch Day January 2026 Addresses Critical Injection and RCE Vulnerabilities appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading