VYPR
Medium severity6.1NVD Advisory· Published Apr 14, 2026· Updated Apr 17, 2026

CVE-2026-0512

CVE-2026-0512

Description

Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL, that if accessed by a victim, results in execution of malicious content within the victim's browser. This could allow the attacker to access and modify information, impacting the confidentiality and integrity of the application, while availability remains unaffected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated XSS vulnerability in the SAP SRM Catalog SICF handler allows attackers to execute malicious content in victims' browsers, impacting confidentiality and integrity.

Vulnerability

Description

The flaw resides in the Internet Communication Framework (ICF) handler of the SAP Supplier Relationship Management (SRM) Catalog component. An unauthenticated attacker can craft a malicious URL that, when accessed by a victim, leads to the execution of arbitrary script content in the victim's browser [1]. The root cause is improper neutralization of user-controlled input during the generation of web pages, a classic cross-site scripting (XSS) pattern.

Exploitation

Prerequisites

No authentication is required to trigger the vulnerability. The attacker only needs to lure a victim into clicking the specially crafted link, either through phishing, social engineering, or by embedding the link in a third-party website [1]. The attack does not require any special network position other than the ability to deliver the URL to the target.

Impact

Successful exploitation allows the attacker to impersonate the victim within the SRM application's browser session. This can lead to unauthorized access to sensitive information and the ability to modify data visible or accessible through the victim's session. The confidentiality and integrity of the affected application are compromised, while availability remains unaffected [1].

Mitigation

SAP has released security patches for this issue as part of its regular Security Patch Day. Administrators should apply the relevant SAP Security Note without delay. No workaround is known, and the vulnerability does not appear on the CISA Known Exploited Vulnerabilities (KEV) catalog at the time of publication. Users are advised to follow SAP's standard patching procedures [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.