{"api_version":"1","generated_at":"2026-04-14T03:14:41+00:00","cve":"CVE-2026-27681","urls":{"html":"https://cve.report/CVE-2026-27681","api":"https://cve.report/api/cve/CVE-2026-27681.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-27681","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-27681"},"summary":{"title":"SQL Injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse","description":"Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.","state":"PUBLISHED","assigner":"sap","published_at":"2026-04-14 00:16:06","updated_at":"2026-04-14 00:16:06"},"problem_types":["CWE-89","CWE-89 CWE-89: Improper Neutralization of Special Elements used in an SQL Command"],"metrics":[{"version":"3.1","source":"cna@sap.com","type":"Primary","score":"9.9","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"9.9","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://me.sap.com/notes/3719353","name":"https://me.sap.com/notes/3719353","refsource":"cna@sap.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://url.sap/sapsecuritypatchday","name":"https://url.sap/sapsecuritypatchday","refsource":"cna@sap.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-27681","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27681","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected HANABPC 810","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected BPC4HANA 300","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected SAP_BW 750","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 752","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 753","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 754","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 755","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 756","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 757","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 758","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","version":"affected 816","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","vendor":"SAP_SE","versions":[{"status":"affected","version":"HANABPC 810"},{"status":"affected","version":"BPC4HANA 300"},{"status":"affected","version":"SAP_BW 750"},{"status":"affected","version":"752"},{"status":"affected","version":"753"},{"status":"affected","version":"754"},{"status":"affected","version":"755"},{"status":"affected","version":"756"},{"status":"affected","version":"757"},{"status":"affected","version":"758"},{"status":"affected","version":"816"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.</p>"}],"value":"Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command","lang":"eng","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T00:08:05.791Z","orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap"},"references":[{"url":"https://me.sap.com/notes/3719353"},{"url":"https://url.sap/sapsecuritypatchday"}],"source":{"discovery":"UNKNOWN"},"title":"SQL Injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse","x_generator":{"engine":"Vulnogram 1.0.1"}}},"cveMetadata":{"assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","assignerShortName":"sap","cveId":"CVE-2026-27681","datePublished":"2026-04-14T00:08:05.791Z","dateReserved":"2026-02-23T17:50:17.027Z","dateUpdated":"2026-04-14T00:08:05.791Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 00:16:06","lastModifiedDate":"2026-04-14 00:16:06","problem_types":["CWE-89","CWE-89 CWE-89: Improper Neutralization of Special Elements used in an SQL Command"],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"27681","Ordinal":"1","Title":"SQL Injection vulnerability in SAP Business Planning and Consoli","CVE":"CVE-2026-27681","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"27681","Ordinal":"1","NoteData":"Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.","Type":"Description","Title":"SQL Injection vulnerability in SAP Business Planning and Consoli"}]}}}