CVE-2025-26661: CWE-862: Missing Authorization in SAP_SE SAP NetWeaver (ABAP Class Builder)
Due to missing authorization check, SAP NetWeaver (ABAP Class Builder) allows an attacker to gain higher access levels than they should have, resulting in escalation of privileges. On successful exploitation, this could result in disclosure of highly sensitive information. It could also have a high impact on the integrity and availability of the application.
AI Analysis
Technical Summary
CVE-2025-26661 is a vulnerability identified in SAP NetWeaver's ABAP Class Builder component, classified under CWE-862 (Missing Authorization). The root cause is the absence of proper authorization checks when accessing certain functionalities within the ABAP Class Builder, which allows an attacker with limited privileges to escalate their access rights beyond intended boundaries. This escalation can lead to unauthorized disclosure of highly sensitive data, as well as compromise the integrity and availability of the SAP application environment. The vulnerability affects a broad range of SAP_BASIS versions from 700 through 914, indicating a long-standing issue across multiple releases. The CVSS v3.1 score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) highlights that the attack can be performed remotely over the network with low complexity and requires only limited privileges, without any user interaction. The scope is unchanged, meaning the impact is confined to the vulnerable component but with high confidentiality, integrity, and availability impacts. No patches or exploits are currently publicly available, but the vulnerability's nature suggests that attackers could leverage it to gain unauthorized elevated access, potentially leading to data breaches, unauthorized modifications, or denial of service within SAP environments. Given SAP NetWeaver's critical role in enterprise resource planning and business operations, this vulnerability poses a significant risk to organizations relying on these systems.
Potential Impact
The potential impact of CVE-2025-26661 is substantial for organizations worldwide using affected SAP NetWeaver versions. Successful exploitation can lead to privilege escalation, enabling attackers to access sensitive business data, intellectual property, and personally identifiable information (PII). This can result in data breaches, regulatory non-compliance, and reputational damage. Furthermore, attackers could alter or disrupt critical business processes, affecting data integrity and system availability, potentially causing operational downtime and financial losses. Given SAP's widespread use in industries such as manufacturing, finance, healthcare, and government, the vulnerability could be leveraged for espionage, sabotage, or fraud. The ease of exploitation over the network with low privileges increases the likelihood of targeted attacks, especially in environments with weak internal access controls. Organizations lacking timely mitigation may face increased risks of insider threats or lateral movement by attackers who have gained initial footholds.
Mitigation Recommendations
To mitigate CVE-2025-26661, organizations should implement the following specific measures: 1) Monitor SAP security advisories closely and apply official patches or security notes from SAP as soon as they become available for the affected SAP_BASIS versions. 2) Enforce strict role-based access controls (RBAC) within SAP environments, ensuring that users have only the minimum necessary privileges, particularly restricting access to ABAP Class Builder functionalities. 3) Conduct regular audits of user permissions and SAP system logs to detect unusual or unauthorized access attempts related to ABAP development tools. 4) Segment SAP systems from general network access using firewalls and network segmentation to limit exposure to potential attackers. 5) Employ SAP-specific security tools and monitoring solutions that can detect privilege escalation attempts and anomalous behavior within SAP modules. 6) Train SAP administrators and developers on secure configuration practices and awareness of this vulnerability to prevent inadvertent exposure. 7) Consider implementing multi-factor authentication (MFA) for SAP access to reduce risk from compromised credentials. 8) Establish incident response plans tailored to SAP environments to quickly respond to any exploitation attempts. These targeted actions go beyond generic advice by focusing on SAP-specific controls and proactive monitoring.
Affected Countries
United States, Germany, India, China, United Kingdom, Japan, France, Brazil, Canada, Australia, South Korea, Netherlands, Italy, Spain
CVE-2025-26661: CWE-862: Missing Authorization in SAP_SE SAP NetWeaver (ABAP Class Builder)
Description
Due to missing authorization check, SAP NetWeaver (ABAP Class Builder) allows an attacker to gain higher access levels than they should have, resulting in escalation of privileges. On successful exploitation, this could result in disclosure of highly sensitive information. It could also have a high impact on the integrity and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-26661 is a vulnerability identified in SAP NetWeaver's ABAP Class Builder component, classified under CWE-862 (Missing Authorization). The root cause is the absence of proper authorization checks when accessing certain functionalities within the ABAP Class Builder, which allows an attacker with limited privileges to escalate their access rights beyond intended boundaries. This escalation can lead to unauthorized disclosure of highly sensitive data, as well as compromise the integrity and availability of the SAP application environment. The vulnerability affects a broad range of SAP_BASIS versions from 700 through 914, indicating a long-standing issue across multiple releases. The CVSS v3.1 score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) highlights that the attack can be performed remotely over the network with low complexity and requires only limited privileges, without any user interaction. The scope is unchanged, meaning the impact is confined to the vulnerable component but with high confidentiality, integrity, and availability impacts. No patches or exploits are currently publicly available, but the vulnerability's nature suggests that attackers could leverage it to gain unauthorized elevated access, potentially leading to data breaches, unauthorized modifications, or denial of service within SAP environments. Given SAP NetWeaver's critical role in enterprise resource planning and business operations, this vulnerability poses a significant risk to organizations relying on these systems.
Potential Impact
The potential impact of CVE-2025-26661 is substantial for organizations worldwide using affected SAP NetWeaver versions. Successful exploitation can lead to privilege escalation, enabling attackers to access sensitive business data, intellectual property, and personally identifiable information (PII). This can result in data breaches, regulatory non-compliance, and reputational damage. Furthermore, attackers could alter or disrupt critical business processes, affecting data integrity and system availability, potentially causing operational downtime and financial losses. Given SAP's widespread use in industries such as manufacturing, finance, healthcare, and government, the vulnerability could be leveraged for espionage, sabotage, or fraud. The ease of exploitation over the network with low privileges increases the likelihood of targeted attacks, especially in environments with weak internal access controls. Organizations lacking timely mitigation may face increased risks of insider threats or lateral movement by attackers who have gained initial footholds.
Mitigation Recommendations
To mitigate CVE-2025-26661, organizations should implement the following specific measures: 1) Monitor SAP security advisories closely and apply official patches or security notes from SAP as soon as they become available for the affected SAP_BASIS versions. 2) Enforce strict role-based access controls (RBAC) within SAP environments, ensuring that users have only the minimum necessary privileges, particularly restricting access to ABAP Class Builder functionalities. 3) Conduct regular audits of user permissions and SAP system logs to detect unusual or unauthorized access attempts related to ABAP development tools. 4) Segment SAP systems from general network access using firewalls and network segmentation to limit exposure to potential attackers. 5) Employ SAP-specific security tools and monitoring solutions that can detect privilege escalation attempts and anomalous behavior within SAP modules. 6) Train SAP administrators and developers on secure configuration practices and awareness of this vulnerability to prevent inadvertent exposure. 7) Consider implementing multi-factor authentication (MFA) for SAP access to reduce risk from compromised credentials. 8) Establish incident response plans tailored to SAP environments to quickly respond to any exploitation attempts. These targeted actions go beyond generic advice by focusing on SAP-specific controls and proactive monitoring.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-02-12T21:05:31.736Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a45b85912abc71d66871
Added to database: 2/26/2026, 7:51:55 PM
Last enriched: 2/26/2026, 8:03:44 PM
Last updated: 2/26/2026, 11:09:36 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28211: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in CyrilleB79 NVDA-Dev-Test-Toolbox
HighCVE-2026-28207: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in z-libs Zen-C
MediumCVE-2026-3265: Improper Authorization in go2ismail Free-CRM
MediumCVE-2026-28225: CWE-639: Authorization Bypass Through User-Controlled Key in manyfold3d manyfold
MediumCVE-2026-28213: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in evershopcommerce evershop
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.