CVE-2026-27683
Description
SAP BusinessObjects Business Intelligence application allows an authenticated attacker to inject malicious JavaScript payloads through crafted URLs. When a victim accesses the URL, the script executes in the user�s browser, potentially exposing restricted information. This results in a low impact on confidentiality with no impact on integrity and availability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SAP BusinessObjects BI allows authenticated attackers to inject malicious JavaScript via crafted URLs, leading to low confidentiality impact.
Vulnerability
Overview
CVE-2026-27683 is a stored/reflected cross-site scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence application. An authenticated attacker can inject malicious JavaScript payloads through specially crafted URLs. When a victim accesses such a URL, the script executes in the user's browser, potentially exposing restricted information. The root cause lies in insufficient sanitization of URL parameters or input fields within the application [1].
Exploitation
To exploit this vulnerability, an attacker must first be authenticated to the SAP BusinessObjects BI system. The attack vector is network-based, requiring the victim to click on a crafted link. No special privileges beyond standard user authentication are needed. The attacker can craft URLs containing malicious JavaScript that, when rendered by the victim's browser, executes in the context of the application's session [1
Impact
Successful exploitation results in a low impact on confidentiality, meaning the attacker may gain access to restricted information visible in the victim's session. There is no impact on integrity or availability. The vulnerability does not allow direct modification of data or denial of service. The CVSS v3 base score is 4.1 (Medium), reflecting the limited scope and prerequisites [1
Mitigation
SAP has released security patches as part of its regular Security Patch Day. Customers are advised to apply the relevant SAP Security Notes for their version. No workarounds are documented; upgrading to the patched version is the recommended action. The vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of publication [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.