VYPR
Medium severity4.3NVD Advisory· Published Jan 13, 2026· Updated Apr 15, 2026

CVE-2026-0493

CVE-2026-0493

Description

Due to a Cross-Site Request Forgery (CSRF) vulnerability in SAP Fiori App Intercompany Balance Reconciliation an attacker could execute state?changing actions using an inappropriate request type, this deviation from expected request semantics may allow an attacker to trigger unintended actions on behalf of an authenticated user causing low impact on integrity of the system. This has no impact on confidentiality and availability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in SAP Fiori App Intercompany Balance Reconciliation lets an attacker trigger state-changing actions on behalf of an authenticated user, with low integrity impact.

Vulnerability

Overview

CVE-2026-0493 describes a Cross-Site Request Forgery (CSRF) vulnerability in the SAP Fiori App Intercompany Balance Reconciliation. The root cause is that the application accepts state-changing requests using an inappropriate or non-standard request type, deviating from expected request semantics. This allows an attacker to craft a malicious request that, when executed by an authenticated user, performs unintended actions without the user's consent [1].

Exploitation

Conditions

To exploit this vulnerability, an attacker must trick an authenticated user into visiting a malicious page or clicking a crafted link while the user has an active session with the affected SAP Fiori app. No special authentication is needed beyond the victim's existing session; the attacker does not need to be authenticated themselves. The attack vector is network-based and does not require man-in-the-middle positioning.

Impact

Successful exploitation results in a low impact on system integrity, as defined by the CVSS score of 4.3. The attacker can perform state-changing operations in the Intercompany Balance Reconciliation app on behalf of the victim. There is no impact on confidentiality or availability, meaning no data disclosure or service disruption occurs.

Mitigation

SAP has addressed this vulnerability in its regularly scheduled Security Patch Day. The fix is delivered via a SAP Security Note. Users are advised to implement the correction as soon as possible by accessing the note through SAP for Me or by applying the latest support package for the affected component [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.