VYPR
High severity7.1NVD Advisory· Published Apr 14, 2026· Updated Apr 17, 2026

CVE-2026-34256

CVE-2026-34256

Description

Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization. If the overwritten report is subsequently executed, the intended functionality could become unavailable. Successful exploitation impacts availability, with a limited impact on integrity confined to the affected report, while confidentiality remains unaffected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization check in SAP ERP and S/4HANA allows authenticated attackers to overwrite ABAP reports, impacting availability and limited integrity.

Vulnerability

Overview

CVE-2026-34256 describes a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise). The flaw resides in a particular ABAP report that, when executed by an authenticated attacker, can overwrite any existing eight-character executable ABAP report without proper authorization. This bypasses the intended access controls, allowing unauthorized modification of report code.

Exploitation

Prerequisites

An attacker must have valid authentication credentials to the SAP system. No additional privileges are required beyond standard user access. The attack can be carried out from any network position where the SAP system is reachable (e.g., via SAP GUI or RFC). The attacker executes the vulnerable ABAP report to overwrite a target report, replacing its code with arbitrary content.

Impact

Assessment

Successful exploitation primarily affects availability: if the overwritten report is subsequently executed, its intended functionality becomes unavailable. There is a limited impact on integrity confined to the affected report (the overwritten report's code is altered), while confidentiality remains unaffected. The CVSS v3 base score is 7.1 (High), reflecting the potential for service disruption.

Mitigation

Status

SAP has addressed this vulnerability through its regular Security Patch Day process. Customers are advised to apply the relevant SAP Security Note as soon as possible. The SAP Security Patch Day portal [1] provides general guidance on obtaining and implementing security corrections. No workarounds have been published; patching is the recommended course of action.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.