CVE-2026-0512
Description
Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL, that if accessed by a victim, results in execution of malicious content within the victim's browser. This could allow the attacker to access and modify information, impacting the confidentiality and integrity of the application, while availability remains unaffected.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated XSS vulnerability in the SAP SRM Catalog SICF handler allows attackers to execute malicious content in victims' browsers, impacting confidentiality and integrity.
Vulnerability
Description
The flaw resides in the Internet Communication Framework (ICF) handler of the SAP Supplier Relationship Management (SRM) Catalog component. An unauthenticated attacker can craft a malicious URL that, when accessed by a victim, leads to the execution of arbitrary script content in the victim's browser [1]. The root cause is improper neutralization of user-controlled input during the generation of web pages, a classic cross-site scripting (XSS) pattern.
Exploitation
Prerequisites
No authentication is required to trigger the vulnerability. The attacker only needs to lure a victim into clicking the specially crafted link, either through phishing, social engineering, or by embedding the link in a third-party website [1]. The attack does not require any special network position other than the ability to deliver the URL to the target.
Impact
Successful exploitation allows the attacker to impersonate the victim within the SRM application's browser session. This can lead to unauthorized access to sensitive information and the ability to modify data visible or accessible through the victim's session. The confidentiality and integrity of the affected application are compromised, while availability remains unaffected [1].
Mitigation
SAP has released security patches for this issue as part of its regular Security Patch Day. Administrators should apply the relevant SAP Security Note without delay. No workaround is known, and the vulnerability does not appear on the CISA Known Exploited Vulnerabilities (KEV) catalog at the time of publication. Users are advised to follow SAP's standard patching procedures [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.