VYPR
patchPublished May 12, 2026· Updated May 18, 2026· 1 source

SAP Patches Critical Code Injection Flaws in S/4HANA and Commerce

SAP released 15 security notes for May 2026, fixing critical code injection vulnerabilities in S/4HANA and Commerce that could allow attackers to leak data and execute arbitrary code.

SAP on Tuesday released 15 new security notes as part of its May 2026 Security Patch Day, addressing critical code injection vulnerabilities in S/4HANA and Commerce that could allow attackers to leak data and execute arbitrary code. Both security defects have a CVSS score of 9.6.

The most severe of the resolved vulnerabilities are critical code injection issues in S/4HANA and Commerce. Tracked as CVE-2026-34260, the S/4HANA bug is described as an SQL injection issue stemming from missing input validation and sanitization. An authenticated attacker could exploit the weakness to inject malicious SQL statements. The vulnerable code only allows read access to data, and a successful attack would only affect application confidentiality and availability, according to SAP security firm Onapsis.

The critical SAP Commerce vulnerability, tracked as CVE-2026-34263, is described as a missing authentication check affecting the cloud configuration. “The vulnerability is caused by an overly permissive security configuration with improper rule ordering, allowing an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution,” Onapsis explains.

SAP’s fresh round of patches also resolves a high-severity OS command injection flaw in Forecasting & Replenishment. Tracked as CVE-2026-34259, it could allow authenticated attackers to execute arbitrary operating system commands.

The remaining 12 security notes released on SAP’s May 2026 Security Patch Day address medium and low-severity bugs in NetWeaver, S/4HANA, Business Server Pages Application, BusinessObjects, Strategic Enterprise Management, Commerce Cloud, SAPUI5, Financial Consolidation, Incentive and Commission Management, and the HANA Deployment Infrastructure (HDI) deploy library.

SAP makes no mention of any of these vulnerabilities being exploited in the wild, but users are advised to apply the patches as soon as possible. The new security notes were released less than two weeks after four SAP NPM packages were injected with malware as part of the Mini Shai-Hulud supply chain attack that affected over 1,800 developers.

This patch cycle underscores the ongoing challenge of securing complex enterprise software ecosystems. With critical flaws in widely deployed products like S/4HANA and Commerce, organizations must prioritize timely patching to mitigate the risk of data breaches and system compromise. The inclusion of a high-severity OS command injection flaw further highlights the need for comprehensive vulnerability management.

Synthesized by Vypr AI