CVE-2025-26658: CWE-384: Session Fixation in SAP_SE SAP Business One (Service Layer)
The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of other users, the attacker must invest considerable time and effort. This vulnerability has a high impact on the confidentiality and integrity of the application with no effect on the availability of the application.
AI Analysis
Technical Summary
CVE-2025-26658 is a session fixation vulnerability classified under CWE-384 affecting the Service Layer component of SAP Business One, specifically versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The vulnerability arises from improper session management that allows an attacker to fixate a session identifier and subsequently hijack authenticated sessions of legitimate users. By doing so, attackers can impersonate other users within the application and perform unauthorized actions, including reading, modifying, or creating data. Although exploitation requires considerable time and effort, no user interaction is necessary, and the attacker needs at least low privileges to initiate the attack. The vulnerability primarily compromises confidentiality and integrity, with no impact on availability. The CVSS v3.1 base score is 6.8, reflecting a medium severity level due to the network attack vector, high impact on confidentiality and integrity, and the requirement for low privileges and high attack complexity. No patches or known exploits have been publicly disclosed as of the publication date (March 11, 2025). This vulnerability highlights weaknesses in session token handling within SAP Business One’s Service Layer, a critical interface for business operations and data management.
Potential Impact
The exploitation of this vulnerability can lead to unauthorized access to sensitive business data and allow attackers to perform unauthorized transactions or modifications within SAP Business One. This can result in data breaches, financial fraud, and manipulation of business-critical information, undermining trust and compliance with regulatory requirements. Since SAP Business One is widely used by small and medium enterprises for ERP functions, the impact can disrupt business operations and lead to significant financial and reputational damage. The lack of availability impact means systems remain operational, potentially allowing prolonged undetected exploitation. Organizations with complex SAP deployments or those integrating SAP Business One with other systems face increased risk of lateral movement and broader compromise.
Mitigation Recommendations
Organizations should immediately review and strengthen session management configurations in SAP Business One Service Layer. Although no official patches are currently available, administrators should enforce strict session timeout policies, regenerate session tokens upon authentication, and monitor for anomalous session activity. Implement network segmentation and restrict access to the Service Layer to trusted hosts and IP ranges. Employ multi-factor authentication (MFA) to reduce the risk of session hijacking. Regularly audit user privileges and limit permissions to the minimum necessary. Monitor logs for unusual access patterns and consider deploying web application firewalls (WAF) with custom rules to detect session fixation attempts. Stay updated with SAP security advisories for forthcoming patches and apply them promptly once released.
Affected Countries
United States, Germany, India, Brazil, United Kingdom, Australia, Canada, Netherlands, France, Japan
CVE-2025-26658: CWE-384: Session Fixation in SAP_SE SAP Business One (Service Layer)
Description
The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of other users, the attacker must invest considerable time and effort. This vulnerability has a high impact on the confidentiality and integrity of the application with no effect on the availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-26658 is a session fixation vulnerability classified under CWE-384 affecting the Service Layer component of SAP Business One, specifically versions B1_ON_HANA 10.0 and SAP-M-BO 10.0. The vulnerability arises from improper session management that allows an attacker to fixate a session identifier and subsequently hijack authenticated sessions of legitimate users. By doing so, attackers can impersonate other users within the application and perform unauthorized actions, including reading, modifying, or creating data. Although exploitation requires considerable time and effort, no user interaction is necessary, and the attacker needs at least low privileges to initiate the attack. The vulnerability primarily compromises confidentiality and integrity, with no impact on availability. The CVSS v3.1 base score is 6.8, reflecting a medium severity level due to the network attack vector, high impact on confidentiality and integrity, and the requirement for low privileges and high attack complexity. No patches or known exploits have been publicly disclosed as of the publication date (March 11, 2025). This vulnerability highlights weaknesses in session token handling within SAP Business One’s Service Layer, a critical interface for business operations and data management.
Potential Impact
The exploitation of this vulnerability can lead to unauthorized access to sensitive business data and allow attackers to perform unauthorized transactions or modifications within SAP Business One. This can result in data breaches, financial fraud, and manipulation of business-critical information, undermining trust and compliance with regulatory requirements. Since SAP Business One is widely used by small and medium enterprises for ERP functions, the impact can disrupt business operations and lead to significant financial and reputational damage. The lack of availability impact means systems remain operational, potentially allowing prolonged undetected exploitation. Organizations with complex SAP deployments or those integrating SAP Business One with other systems face increased risk of lateral movement and broader compromise.
Mitigation Recommendations
Organizations should immediately review and strengthen session management configurations in SAP Business One Service Layer. Although no official patches are currently available, administrators should enforce strict session timeout policies, regenerate session tokens upon authentication, and monitor for anomalous session activity. Implement network segmentation and restrict access to the Service Layer to trusted hosts and IP ranges. Employ multi-factor authentication (MFA) to reduce the risk of session hijacking. Regularly audit user privileges and limit permissions to the minimum necessary. Monitor logs for unusual access patterns and consider deploying web application firewalls (WAF) with custom rules to detect session fixation attempts. Stay updated with SAP security advisories for forthcoming patches and apply them promptly once released.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-02-12T21:05:31.735Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a45985912abc71d662c3
Added to database: 2/26/2026, 7:51:53 PM
Last enriched: 2/26/2026, 8:03:56 PM
Last updated: 2/26/2026, 11:15:08 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.