VYPR
Low severity2.0NVD Advisory· Published Apr 14, 2026· Updated Apr 17, 2026

CVE-2026-27675

CVE-2026-27675

Description

SAP Landscape Transformation contains a vulnerability in an RFC-exposed function module that could allow a high privileged adversary to inject arbitrary ABAP code and operating system commands. Due to this, some information could be modified, but the attacker does not have control over kind or degree. This leads to a low impact on integrity, while confidentiality and availability are not impacted.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A high-privileged attacker can exploit an RFC function module in SAP Landscape Transformation to inject arbitrary ABAP code and OS commands with low integrity impact.

Vulnerability

Details

CVE-2026-27675 exists in an RFC-exposed function module within SAP Landscape Transformation [1]. The root cause is insufficient sanitization of input passed to the module, enabling a high-privileged adversary to inject arbitrary ABAP code and operating system commands. The official description notes that the attacker lacks control over the kind or degree of modification, limiting the exploit's flexibility [1].

Attack

Path

To exploit the vulnerability, an attacker must already possess high privileges within the SAP system and have network access to the RFC interface. The attack requires no user interaction, but the prerequisite of high privileges significantly reduces the likelihood of exploitation in well-configured environments. The CVSS v3 score of 2.0 reflects these constraints.

Impact

Successful exploitation allows the attacker to alter certain information within the SAP system, impacting integrity. However, confidentiality and availability remain unaffected. The low integrity impact (as defined by CVSS 2.0/3.0) means only limited data can be modified, and the attacker cannot precisely determine what changes occur [1].

Mitigation

SAP recommends applying the security patch delivered through the regular SAP Security Patch Day process, specifically the correction referenced in SAP Security Notes [1]. Administrators should review and apply the note for SAP Landscape Transformation to close the vulnerability. No workarounds are documented; patching is the primary remediation.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.