VYPR
Low severity3.4NVD Advisory· Published May 12, 2026· Updated May 12, 2026

CVE-2026-40131

CVE-2026-40131

Description

SQL injection vulnerability exists in @sap/hdi-deploy package, where SQL queries are dynamically constructed using user input without proper parameterization or prepared statements. Successful exploitation could allow the high privileged users to alter the SELECT statements impacting confidentiality and availability of the application. There is no impact on integrity.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in @sap/hdi-deploy allows high-privileged users to alter SELECT statements, impacting confidentiality and availability.

Vulnerability

The @sap/hdi-deploy package contains an SQL injection vulnerability due to dynamic construction of SQL queries from user input without proper parameterization or prepared statements [1]. This flaw affects applications that handle high-privilege user input in database queries.

Exploitation

An attacker with high privileges can inject malicious SQL payloads to alter SELECT statements. The attack requires authenticated access with sufficient permissions to interact with the vulnerable code path.

Impact

Successful exploitation impacts confidentiality and availability of the application, potentially allowing unauthorized data access or service disruption. Integrity remains unaffected.

Mitigation

SAP has addressed this issue in a security note released on the monthly Security Patch Day [1]. Users should apply the provided patch to remediate the vulnerability.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.