VYPR

Fiori App Intercompany Balance Reconciliation

by SAP

CVEs (6)

  • CVE-2026-0511HigJan 13, 2026
    risk 0.53cvss 8.1epss 0.00

    SAP Fiori App Intercompany Balance Reconciliation does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has high impact on confidentiality and integrity of the application ,availability is not impacted.

  • CVE-2026-0496MedJan 13, 2026
    risk 0.43cvss 6.6epss 0.00

    SAP Fiori App Intercompany Balance Reconciliation allows an attacker with high privileges to upload any file (including script files) without proper file format validation. This has low impact on confidentiality, integrity and availability of the application.

  • CVE-2026-0495MedJan 13, 2026
    risk 0.33cvss 5.1epss 0.00

    SAP Fiori App Intercompany Balance Reconciliation allows an attacker with high privileges to send uploaded files to arbitrary emails which could enable effective phishing campaigns. This has low impact on confidentiality, integrity and availability of the application.

  • CVE-2026-23683MedJan 27, 2026
    risk 0.28cvss 4.3epss 0.00

    SAP Fiori App Intercompany Balance Reconciliation does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has low impact on confidentiality, integrity and availability are not impacted.

  • CVE-2026-0494MedJan 13, 2026
    risk 0.28cvss 4.3epss 0.00

    Under certain conditions SAP Fiori App Intercompany Balance Reconciliation application allows an attacker to access information which would otherwise be restricted. This has low impact on confidentiality of the application, integrity and availability are not impacted.

  • CVE-2026-0493MedJan 13, 2026
    risk 0.28cvss 4.3epss 0.00

    Due to a Cross-Site Request Forgery (CSRF) vulnerability in SAP Fiori App Intercompany Balance Reconciliation an attacker could execute state?changing actions using an inappropriate request type, this deviation from expected request semantics may allow an attacker to trigger unintended actions on behalf of an authenticated user causing low impact on integrity of the system. This has no impact on confidentiality and availability.