Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0493: CWE-352: Cross-Site Request Forgery in SAP_SE SAP Fiori App (Intercompany Balance Reconciliation)

0
Medium
VulnerabilityCVE-2026-0493cvecve-2026-0493cwe-352
Published: Tue Jan 13 2026 (01/13/2026, 01:13:06 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Fiori App (Intercompany Balance Reconciliation)

Description

CVE-2026-0493 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability affecting the SAP Fiori App for Intercompany Balance Reconciliation. An attacker can exploit this flaw to perform unauthorized state-changing actions on behalf of an authenticated user without their interaction. The vulnerability impacts the integrity of the system but does not affect confidentiality or availability. It affects multiple versions of SAP Fiori UIAPFI and S4CORE products. Exploitation requires the attacker to have network access and the victim to be authenticated, but no user interaction is needed. There are no known exploits in the wild, and no patches have been linked yet. European organizations using these SAP products should be aware of the risk of unauthorized financial or accounting data manipulation. Mitigation involves implementing strict CSRF protections, validating request types, and monitoring for anomalous transactions. Countries with significant SAP enterprise usage and strong reliance on intercompany financial processes are most at risk.

AI-Powered Analysis

AILast updated: 01/13/2026, 02:00:09 UTC

Technical Analysis

CVE-2026-0493 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SAP Fiori App for Intercompany Balance Reconciliation, a component used to manage and reconcile financial transactions between affiliated companies. The vulnerability arises because the application improperly handles request semantics, allowing state-changing actions to be triggered via inappropriate request types without proper CSRF token validation. This deviation enables an attacker to craft malicious requests that, when executed by an authenticated user’s browser, perform unintended actions such as altering intercompany balance data. The flaw affects a broad range of SAP Fiori versions (UIAPFI70 500 through 900 series, and S4CORE versions 102 to 109), indicating widespread exposure across SAP’s enterprise resource planning (ERP) ecosystem. The CVSS 3.1 score of 4.3 reflects a medium severity, with the attack vector being network-based, requiring low attack complexity, and needing privileges of an authenticated user but no user interaction. The vulnerability impacts system integrity by allowing unauthorized modifications but does not compromise confidentiality or availability. No public exploits or patches are currently available, emphasizing the need for proactive mitigation. The vulnerability is classified under CWE-352, which highlights weaknesses in CSRF protections that can lead to unauthorized state changes in web applications.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of financial data managed through SAP Fiori’s Intercompany Balance Reconciliation app. Unauthorized state changes could lead to inaccurate financial records, misreported intercompany balances, and potential compliance issues with financial regulations such as GDPR and IFRS. While confidentiality and availability remain unaffected, the integrity compromise could disrupt accounting processes and internal audits, potentially causing financial discrepancies and operational inefficiencies. Organizations heavily reliant on SAP ERP systems for intercompany financial operations are at greater risk. Attackers exploiting this vulnerability could manipulate transaction data without detection if monitoring and controls are insufficient. This could undermine trust in financial reporting and expose organizations to regulatory scrutiny. Given SAP’s widespread adoption in Europe, especially in Germany, France, the UK, and the Netherlands, the impact could be significant in sectors such as manufacturing, finance, and logistics where intercompany transactions are frequent.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Enforce strict CSRF token validation on all state-changing requests within the SAP Fiori Intercompany Balance Reconciliation app, ensuring tokens are unique per session and verified server-side. 2) Restrict HTTP methods to appropriate verbs (e.g., POST for state changes) and reject requests using inappropriate methods that could trigger unintended actions. 3) Conduct thorough code reviews and penetration testing focused on CSRF protections within custom SAP Fiori extensions or integrations. 4) Monitor logs for unusual or unexpected intercompany transaction modifications, setting alerts for anomalous activity patterns. 5) Limit user privileges to the minimum necessary, reducing the risk posed by compromised accounts. 6) Apply SAP security notes and patches promptly once available, and subscribe to SAP’s security advisories for timely updates. 7) Educate users about the risks of CSRF and encourage safe browsing practices, especially when accessing SAP portals. 8) Consider deploying web application firewalls (WAF) with CSRF detection capabilities to provide an additional layer of defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-12-09T22:06:35.874Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6965a2cca60475309fcd680d

Added to database: 1/13/2026, 1:41:32 AM

Last enriched: 1/13/2026, 2:00:09 AM

Last updated: 1/13/2026, 6:59:14 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats