{"api_version":"1","generated_at":"2026-05-12T11:07:27+00:00","cve":"CVE-2026-40129","urls":{"html":"https://cve.report/CVE-2026-40129","api":"https://cve.report/api/cve/CVE-2026-40129.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40129","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40129"},"summary":{"title":"Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","description":"Due to a Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform, an authenticated attacker could send specially crafted inputs to the application. If processed by the application, this input could be delivered to users subscribed to the channel and result in execution. Successful exploitation could enable the attacker to execute arbitrary code for other users, resulting in a low impact on the integrity, with no impact to the confidentiality and availability of the system.","state":"PUBLISHED","assigner":"sap","published_at":"2026-05-12 03:16:11","updated_at":"2026-05-12 03:16:11"},"problem_types":["CWE-94","CWE-94 CWE-94: Improper Control of Generation of Code"],"metrics":[{"version":"3.1","source":"cna@sap.com","type":"Primary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://me.sap.com/notes/3735359","name":"https://me.sap.com/notes/3735359","refsource":"cna@sap.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://url.sap/sapsecuritypatchday","name":"https://url.sap/sapsecuritypatchday","refsource":"cna@sap.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40129","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40129","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 740","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 750","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 751","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 752","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 753","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 754","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 755","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 756","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 757","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 758","platforms":[]},{"source":"CNA","vendor":"SAP_SE","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","version":"affected SAP_BASIS 816","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","vendor":"SAP_SE","versions":[{"status":"affected","version":"SAP_BASIS 740"},{"status":"affected","version":"SAP_BASIS 750"},{"status":"affected","version":"SAP_BASIS 751"},{"status":"affected","version":"SAP_BASIS 752"},{"status":"affected","version":"SAP_BASIS 753"},{"status":"affected","version":"SAP_BASIS 754"},{"status":"affected","version":"SAP_BASIS 755"},{"status":"affected","version":"SAP_BASIS 756"},{"status":"affected","version":"SAP_BASIS 757"},{"status":"affected","version":"SAP_BASIS 758"},{"status":"affected","version":"SAP_BASIS 816"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Due to a Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform, an authenticated attacker could send specially crafted inputs to the application. If processed by the application, this input could be delivered to users subscribed to the channel and result in execution. Successful exploitation could enable the attacker to execute arbitrary code for other users, resulting in a low impact on the integrity, with no impact to the confidentiality and availability of the system.</p>"}],"value":"Due to a Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform, an authenticated attacker could send specially crafted inputs to the application. If processed by the application, this input could be delivered to users subscribed to the channel and result in execution. Successful exploitation could enable the attacker to execute arbitrary code for other users, resulting in a low impact on the integrity, with no impact to the confidentiality and availability of the system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94: Improper Control of Generation of Code","lang":"eng","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T02:20:45.186Z","orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap"},"references":[{"url":"https://me.sap.com/notes/3735359"},{"url":"https://url.sap/sapsecuritypatchday"}],"source":{"discovery":"UNKNOWN"},"title":"Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform","x_generator":{"engine":"Vulnogram 1.0.2"}}},"cveMetadata":{"assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","assignerShortName":"sap","cveId":"CVE-2026-40129","datePublished":"2026-05-12T02:20:45.186Z","dateReserved":"2026-04-09T17:29:44.663Z","dateUpdated":"2026-05-12T02:20:45.186Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-12 03:16:11","lastModifiedDate":"2026-05-12 03:16:11","problem_types":["CWE-94","CWE-94 CWE-94: Improper Control of Generation of Code"],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40129","Ordinal":"1","Title":"Code Injection vulnerability in SAP Application Server ABAP for ","CVE":"CVE-2026-40129","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40129","Ordinal":"1","NoteData":"Due to a Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform, an authenticated attacker could send specially crafted inputs to the application. If processed by the application, this input could be delivered to users subscribed to the channel and result in execution. Successful exploitation could enable the attacker to execute arbitrary code for other users, resulting in a low impact on the integrity, with no impact to the confidentiality and availability of the system.","Type":"Description","Title":"Code Injection vulnerability in SAP Application Server ABAP for "}]}}}