VYPR
Medium severity6.1NVD Advisory· Published Jan 13, 2026· Updated Apr 15, 2026

CVE-2026-0499

CVE-2026-0499

Description

SAP NetWeaver Enterprise Portal allows an unauthenticated attacker to inject malicious scripts into a URL parameter. The scripts are reflected in the server response and executed in a user's browser when the crafted URL is visited, leading to theft of session information, manipulation of portal content, or user redirection, resulting in a low impact on the application's confidentiality and integrity, with no impact on availability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated reflected XSS vulnerability in SAP NetWeaver Enterprise Portal allows an attacker to inject malicious scripts via a URL parameter, leading to session theft or content manipulation.

Vulnerability

Description CVE-2026-0499 is a reflected cross-site scripting (XSS) vulnerability in the SAP NetWeaver Enterprise Portal. The root cause is improper sanitization of a URL parameter, allowing an unauthenticated attackers can inject arbitrary JavaScript into the parameter value. When a user visits the crafted URL, the server reflects the malicious script in the response, which then executes in the user's browser [1].

Exploitation

Requirements No authentication is required to exploit this vulnerability. An attacker only needs to trick a victim into clicking a specially crafted link, for example through a phishing email or by embedding the link on a third-party site. The XSS is reflected, meaning the malicious payload is not stored on the server but is delivered via the URL itself.

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's session on the vulnerable portal. This can lead to theft of session cookies or other sensitive information, manipulation of portal content displayed to the victim, or redirection to malicious sites. The official description notes low impact on confidentiality and integrity, with no impact on availability [1].

Mitigation

SAP has released a security patch as part of its monthly Patch Day. Customers are advised to apply the corresponding SAP Security Note on SAP for Me. No workarounds have been published; updating to the patched version is the recommended action [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.