VYPR
Medium severity6.1NVD Advisory· Published Apr 14, 2026· Updated Apr 17, 2026

CVE-2026-27674

CVE-2026-27674

Description

Due to a Code Injection vulnerability in SAP NetWeaver Application Server Java (Web Dynpro Java), an unauthenticated attacker could supply crafted input that is interpreted by the application and causes it to reference attacker-controlled content. If a victim accesses the affected functionality, that attacker-controlled content could be executed in the victim�s browser, potentially resulting in session compromise. This could allow the attacker to execute arbitrary client-side code, impacting the confidentiality and integrity of the application, with no impact to availability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated code injection vulnerability in SAP NetWeaver AS Java (Web Dynpro Java) allows attacker-controlled content execution in a victim's browser, leading to session compromise.

Vulnerability

Overview

A Code Injection vulnerability exists in SAP NetWeaver Application Server Java, specifically within the Web Dynpro Java component. The flaw enables an unauthenticated attacker to supply crafted input that the application incorrectly interprets, causing it to reference attacker-controlled content. This is a classic injection issue where user-supplied data is not properly sanitized before being processed by the application [1].

Exploitation

Requirements

The attack requires a victim to access the affected functionality while the attacker's crafted input is being processed. No authentication is needed on the attacker's part, as the vulnerability can be triggered remotely. The attacker supplies malicious input that, when reflected or processed by the application, forces the victim's browser to load and execute attacker-controlled content, such as a specially crafted script or resource [1].

Impact

Successful exploitation leads to arbitrary client-side code execution in the victim's browser. This can result in session compromise, allowing the attacker to hijack the victim's active session, access sensitive data, and perform actions on behalf of the victim. The vulnerability impacts the confidentiality and integrity of the application, while availability remains unaffected [1].

Mitigation

SAP has released security notes as part of its regular Security Patch Day process. Customers are advised to implement the provided corrections promptly. The patch addresses the input validation flaw that permits code injection. No workarounds are mentioned; applying the security update is the recommended course of action [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.