SAP Security Notes: February 2026 Patch Day

Onapsis Research Labs supported SAP in patching a Critical Code Injection vulnerability in SAP CRM and SAP S/4HANA

Highlights of February SAP Security Notes analysis include:

  • February Summary Twenty-nine new and updated SAP security patches released, including three HotNews Notes and seven High Priority Notes
  • Critical Code Injection Vulnerability in SAP CRM and S/4HANA allows execution of arbitrary SQL statements
  • Onapsis Research Labs Contribution Our team supported SAP in patching eight vulnerabilities, covered by seven SAP Security Notes

SAP has published twenty-nine new and updated SAP Security Notes in its February Patch Day, including three HotNews Notes and seven High Priority Notes. Seven of the twenty-seven new Security Notes were published in contribution with the Onapsis Research Labs.

The HotNews Notes in Detail

The Onapsis Research Labs (ORL) supported SAP in patching a critical Code Injection vulnerability in SAP CRM and SAP S/4HANA, tagged with the highest CVSS score in February.

SAP Security Note #3697099, tagged with a CVSS score of 9.9, patches this vulnerability in the Scripting Editor of the application. It allows an authenticated attacker to execute unauthorized critical functionalities, including the execution of arbitrary SQL statements. A successful exploit can lead to a full compromise of the database with high impact on confidentiality, integrity, and availability of the application. SAP has added additional allowlist checks to the affected generic function module call with the patch. As a temporary workaround, the affected ICF service can be deactivated.

SAP Security Note #3674774, tagged with a CVSS score of 9.6, patches a Missing Authorization Check vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform. Under certain circumstances, an authenticated, low-privileged user can perform background Remote Function Calls without the required S_RFC authorization. To patch the vulnerability, customers must implement a kernel update and set a profile parameter. Adjustments in user roles and UCON settings might be required to not interrupt business processes.

The third HotNews Note is SAP Security Note #3697979, tagged with a CVSS score of 9.1. The note was updated with the information that the vulnerability was reported externally. The note was initially released on SAP’s January Patch Day and patches the same Code Injection vulnerability in SAP Landscape Transformation that was also patched for SAP S/4HANA (Private Cloud and On-Premise) with HotNews Note #3694242. The vulnerable RFC Function Module was reported to SAP by the Onapsis Research Labs in December 2025.

The High Priority Notes in Detail

SAP Security Note #3697567, tagged with a CVSS score of 8.8, patches an XML Signature Wrapping vulnerability in SAP NetWeaver AS ABAP and ABAP Platform. The vulnerability allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered identity information, unauthorized access to sensitive user data and potential disruption of normal system usage. There is a workaround available but it can not cover all usage scenarios of signed XML documents.

SAP Security Note #3705882, tagged with a CVSS score of 7.7, addresses an RFC Module in the SAP Solution Tools Plug-In (ST-PI) that discloses sensitive information to unauthorized users. The information could be used in succeeding system attack attempts and is no longer exposed after implementing the patch. 

The Onapsis Research Labs (ORL) supported SAP in fixing two of the seven High Priority Notes.

SAP Security Note #3703092, tagged with a CVSS score of 7.7, patches a Denial of Service vulnerability in SAP Supply Chain Management. Our team detected a remote-enabled Function Module that allows an authenticated attacker with regular user privileges and network access to control the number of loop executions. By calling this module repeatedly, it consumes excessive system resources, potentially rendering the system unavailable.   

Another Denial of Service vulnerability was detected by our ORL team in SAP BusinessObjects BI Platform. By sending specially crafted requests, unauthenticated attackers are able to crash and automatically restart the Content Management Server (CMS). Submitting these requests repeatedly, the attacker could induce a persistent service disruption, rendering the CMS completely unavailable. The vulnerability is tagged with a CVSS score of 7.5 and patched with SAP Security Note #3678282. As a temporary workaround, CORBA SSL can be implemented.  

SAP Security Note #3654236, tagged with a CVSS score of 7.5, addresses another Denial of Service vulnerability in SAP BusinessObjects BI Platform. It allows an unauthenticated attacker to craft a specific network request to the trusted endpoint that breaks the authentication, which prevents the legitimate users from accessing the platform. The patch allows customers to configure the web application’s trusted endpoint with mutual TLS (mTLS) to only accept queries from trusted backend servers. As a temporary workaround, the landscape can be segregated into different network segments. 

SAP Security Note #3692405, tagged with a CVSS score of 7.4, provides a patch for SAP Commerce Cloud that includes a version of the Eclipse Jersey library that is no longer vulnerable to the race condition tracked under CVE-2025-12383. Staying unpatched, an authenticated user could bypass SSL trust validation for outbound connections, leading to a high impact on confidentiality and integrity of the application.

SAP Security Note #3674246, tagged with a CVSS score of 7.3, patches an Open Redirect vulnerability in SAP BusinessObjects Business Intelligence Platform. The vulnerability allows authenticated attackers to redirect victims to an attacker-controlled domain and subsequently download malicious content. The patch introduces server-side allowlisting to prevent any unvalidated redirects to third-party URLs.

Onapsis Contribution
In addition to the HotNews Note and the two High Priority Notes, the ORL team supported SAP in fixing another five vulnerabilities, covered by four SAP Security Notes.

The ORL team identified an Open Redirect vulnerability in the TAF_APPLAUNCHER Business Server Pages Application that could be exploited to redirect users to attacker‑controlled sites, potentially exposing or altering sensitive information in the victim’s browser. SAP Security Note #3688319, tagged with a CVSS score of 6.1, patches the issue by introducing a security warning to users before any redirection to external URL. If Component Based Test Automation is not used, the affected TAF_APPLAUNCHER application can be deactivated.

SAP Security Note #3678417 patches an Open Redirect vulnerability and a Cross-Site Scripting vulnerability in BSP Applications of SAP Document Management System, both tagged with a CVSS score of 6.1. The CVSS vector of the two vulnerabilities is identical and shows a low impact on the confidentiality and integrity of the application. The patch deprecates the vulnerable functions and URL parameters in the affected BSP application pages. 

An Information Disclosure vulnerability was detected by our team in SAP Commerce Cloud. The application exposes some API endpoints to unauthenticated users. On submit, these endpoints return sensitive information that is not intended to be publicly accessible via the front-end. The vulnerability is tagged with a CVSS score of 5.3 and patched with SAP Security Note #3687771

SAP Security Note #3680390, tagged with a CVSS score of 4.3, patches a Missing Authorization Check vulnerability in SAP Strategic Enterprise Management. The vulnerability causes low impact on confidentiality by allowing authenticated attackers to access information that they are otherwise unauthorized to view.

Summary & Conclusions

With twenty-nine Security Notes, including three HotNews Note and seven High Priority Notes, SAP’s February’s Patch Day is a very busy one. We are proud that our Onapsis Research Labs could contribute to this Patch Day by supporting SAP in patching eight vulnerabilities, including one tagged as HotNews and two tagged as High Priority Notes.

SAP NoteTypeDescriptionPriorityCVSS
3697099New[CVE-2026-0488] Code Injection vulnerability in SAP CRM and SAP S/4HANA (Scripting Editor)
CRM-IC-FRW
HotNews9.9
3674774New[CVE-2026-0509] Missing Authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform
BC-MID-RFC
HotNews9.6
3697979Update[CVE-2026-0491] Code Injection vulnerability in SAP Landscape Transformation
CA-DT-ANA
HotNews9.1
3697567New[CVE-2026-23687] XML Signature Wrapping in SAP NetWeaver AS ABAP and ABAP Platform
BC-SEC-WSS
High8.8
3703092New[CVE-2026-23689] Denial of service (DOS) in SAP Supply Chain Management
SCM-APO-CA-COP
High7.7
3705882New[CVE-2026-24322] Missing Authorization check in SAP Solution Tools Plug-In (ST-PI)
SV-SMG-SDD
High7.7
3678282New[CVE-2026-0485] Denial of service (DOS) vulnerability in SAP BusinessObjects BI Platform
BI-BIP-SRV
High7.5
3654236New[CVE-2026-0490] Denial of service (DOS) in SAP BusinessObjects BI Platform
BI-BIP-SRV
High7.5
3692405New[CVE-2025-12383] Race Condition in SAP Commerce Cloud
CEC-SCC-PLA-PL
High7.4
3674246New[CVE-2026-0508] Open Redirect vulnerability in SAP BusinessObjects Business Intelligence Platform
BI-BIP-SEC
High7.3
3695912New[CVE-2026-24324] Denial of service (DOS) vulnerability in SAP BusinessObjects Business Intelligence Platform (AdminTools)
BI-BIP-SRV
Medium6.5
3672622New[CVE-2026-0484] Missing Authorization check in SAP NetWeaver Application Server ABAP and SAP S/4HANA
BC-DWB-CEX-CF
Medium6.5
3688319New[CVE-2026-24328] Open Redirection vulnerability in Business Server Pages Application (TAF_APPLAUNCHER)
SV-SMG-TWB-CBT
Medium6.1
3678417New[CVE-2026-0505] Multiple vulnerabilities in BSP Applications of SAP Document Management System
CA-DMS-OP
Medium6.1
3503138Update[CVE-2025-0059] Information Disclosure vulnerability in SAP NetWeaver Application Server ABAP (applications based on SAP GUI for HTML)
BC-FES-WGU
Medium6
3689543New[CVE-2026-23684] Race condition vulnerability in SAP Commerce Cloud
CEC-SCC-COM-BC-OCC
Medium5.9
3679346New[CVE-2026-24319] Information Disclosure Vulnerability in SAP Business One (B1 Client Memory Dump Files)
SBO-CRO-SEC
Medium5.8
3687771New[CVE-2026-24321] Information Disclosure vulnerability in SAP Commerce Cloud
CEC-SCC-COM-BC-OCC
Medium5.3
3710111New[CVE-2026-24312] Missing authorization check in SAP Business Workflow
BC-BMT-WFM
Medium5.2
3691645New[CVE-2026-0486] Missing Authorization Check in ABAP based SAP systems
SV-SMG-SDD
Medium5
3697256New[CVE-2026-24325] Cross Site Scripting (XSS) vulnerability in SAP BusinessObjects Enterprise (Central Management Console)
BI-BIP-CMC
Medium4.8
3687285New[CVE-2026-23685] Insecure Deserialization vulnerability in SAP NetWeaver (JMS service)
BC-JAS-JMS
Medium4.4
3680390New[CVE-2026-24327] Missing Authorization Check in SAP Strategic Enterprise Management (Balanced Scorecard in BSP Application)
FIN-SEM-CPM-BSC
Medium4.3
3678009New[CVE-2026-24326] Missing authorization check in SAP S/4HANA Defense & Security (Disconnected Operations)
IS-DFS-BIT
Medium4.3
3215823New[CVE-2026-23688] Missing Authorization check in SAP Fiori App (Manage Service Entry Sheets – Lean Services)
MM-PUR-SVC-SES
Medium4.3
3680416New[CVE-2026-23681] Missing Authorization check in a function module in SAP Support Tools Plug-In
SV-SMG-SDD
Medium4.3
3122486New[CVE-2026-23683] Missing Authorization check in SAP Fiori App (Intercompany Balance Reconciliation)
FI-LOC-FI-RU
Medium4.3
3673213New[CVE-2026-23686] CRLF Injection vulnerability in SAP NetWeaver Application Server Java
BC-MID-CON-JCO
Low3.4
3678313New[CVE-2026-24320] Memory Corruption vulnerability in SAP NetWeaver and ABAP Platform (Application Server ABAP)
BC-CST-IC
Low3.1

As always, the Onapsis Research Labs is already updating The Onapsis Platform to incorporate the newly published vulnerabilities into the product so that our customers can protect their businesses.

For more information about the latest SAP security issues and our continuous efforts to share knowledge with the security community, subscribe to our monthly Defender’s Monthly Newsletter.