CVE-2026-40132
Description
Due to missing authorization check in SAP Strategic Enterprise Management (Scorecard Wizard in Business Server Pages), an authenticated attacker could access information that they are otherwise unauthorized to view. This vulnerability also enables the attacker to change the default settings and modify value fields, which will mislead risk evaluations and falsely lower assessed risk levels. This results in a low impact on the confidentiality and integrity of the data. There is no impact on the application�s availability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing authorization check in SAP Strategic Enterprise Management Scorecard Wizard allows authenticated attackers to access unauthorized data and manipulate risk evaluations.
The vulnerability resides in the Scorecard Wizard component of SAP Strategic Enterprise Management, implemented with Business Server Pages (BSP). Due to a missing authorization check, the application fails to enforce proper access controls on specific function calls. This flaw allows an authenticated user to perform operations beyond their intended privilege level.[1]
To exploit the vulnerability, an attacker must be authenticated to the SAP system. No special privileges or network conditions beyond normal authenticated access are required. The attacker can directly invoke the vulnerable wizard functionality to query or modify data that should be restricted based on user roles.[1]
The impact is twofold: confidentiality is affected because the attacker can view information they are not authorized to see. Integrity is also compromised, as the attacker can change default settings and modify value fields. This ability to tamper with risk-related fields can lead to misleading risk evaluations and falsely lower assessed risk levels, potentially affecting business decisions. Availability of the application is not impacted.[1]
SAP has released a security note as part of its regular Security Patch Day. Customers are advised to implement the provided fix by SAP Security Notes. apply the corresponding correction notes promptly to mitigate the risk. No workarounds are described.[1]
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.