Known Vulnerabilities for Netweaver As Abap by Sap

Listed below are 10 of the newest known vulnerabilities associated with "Netweaver As Abap" by "Sap".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-40135 json An OS Command Injection vulnerability exists in the SAP NetWeaver Application Server for ABAP and ABAP Platform that allows a... Not Provided 2026-05-12 2026-05-12
CVE-2026-40129 json Due to a Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform, an authenticated at... Not Provided 2026-05-12 2026-05-12
CVE-2026-34257 json Due to an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated attacker could craft malic... Not Provided 2026-04-14 2026-04-14
CVE-2026-27682 json Due to a reflected cross-site scripting (XSS) vulnerability in SAP NetWeaver Application Server ABAP (Applications based on B... Not Provided 2026-05-12 2026-05-12
CVE-2022-39799 json An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, re... 6.1 - MEDIUM 2022-09-13 2022-10-05
CVE-2022-35294 json An attacker with basic business user privileges could craft and upload a malicious file to SAP NetWeaver Application Server A... 5.4 - MEDIUM 2022-09-13 2022-10-05
CVE-2022-27668 json Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated atta... 9.8 - CRITICAL 2022-06-14 2022-10-27
CVE-2022-22543 json SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77,... 7.5 - HIGH 2022-02-09 2022-10-25
CVE-2022-22540 json SAP NetWeaver AS ABAP (Workplace Server) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 787, allows a... 7.5 - HIGH 2022-02-09 2022-10-05
CVE-2022-22536 json SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP ... 10 - CRITICAL 2022-02-09 2023-09-27

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationSapNetweaver As Abap804
ApplicationSapNetweaver As Abap782
ApplicationSapNetweaver As Abap75e
ApplicationSapNetweaver As Abap75d
ApplicationSapNetweaver As Abap75c
ApplicationSapNetweaver As Abap75b
ApplicationSapNetweaver As Abap75a
ApplicationSapNetweaver As Abap755
ApplicationSapNetweaver As Abap754
ApplicationSapNetweaver As Abap753
ApplicationSapNetweaver As Abap752
ApplicationSapNetweaver As Abap751
ApplicationSapNetweaver As Abap750
ApplicationSapNetweaver As Abap740
ApplicationSapNetweaver As Abap731
ApplicationSapNetweaver As Abap730
ApplicationSapNetweaver As Abap711
ApplicationSapNetweaver As Abap710
ApplicationSapNetweaver As Abap702
ApplicationSapNetweaver As Abap701
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report