Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0505: CWE-79: Improper Neutralization of Input During Web Page Generation in SAP_SE SAP Document Management System

0
Medium
VulnerabilityCVE-2026-0505cvecve-2026-0505cwe-79
Published: Tue Feb 10 2026 (02/10/2026, 03:01:30 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Document Management System

Description

CVE-2026-0505 is a medium severity vulnerability in SAP Document Management System's BSP applications that allows unauthenticated attackers to manipulate URL parameters insufficiently validated, resulting in unvalidated redirection to attacker-controlled sites. This vulnerability stems from improper neutralization of input (CWE-79) and can impact confidentiality and integrity with no effect on availability. Exploitation requires user interaction but no authentication, and the vulnerability affects multiple SAP_APPL and S4CORE versions widely used in enterprise environments. While no known exploits are currently in the wild, the vulnerability's scope and ease of exploitation necessitate prompt mitigation. European organizations using affected SAP versions should prioritize patching and implement strict URL validation and monitoring to prevent phishing and redirection attacks. Countries with significant SAP deployments and critical infrastructure reliance on SAP systems are at higher risk. The CVSS score of 6. 1 reflects a medium severity level due to the limited impact and required user interaction.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:40:40 UTC

Technical Analysis

CVE-2026-0505 is a vulnerability identified in the SAP Document Management System, specifically within BSP (Business Server Pages) applications. The root cause is improper neutralization of input during web page generation, classified under CWE-79 (Cross-Site Scripting). The vulnerability allows unauthenticated attackers to manipulate user-controlled URL parameters that are not sufficiently validated or sanitized. This manipulation can lead to unvalidated redirection, where victims are redirected to attacker-controlled websites. Such redirections can facilitate phishing attacks, credential theft, or delivery of malicious payloads. The vulnerability affects multiple SAP_APPL versions (618, 600-617) and S4CORE versions (102-109), indicating a broad impact across SAP enterprise environments. The CVSS 3.1 score of 6.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The scope is changed, affecting confidentiality and integrity to a low degree, with no impact on availability. No patches are linked yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability's exploitation could be used as a stepping stone for social engineering or further attacks by redirecting users to malicious sites.

Potential Impact

For European organizations, the impact primarily involves potential confidentiality and integrity breaches through phishing or malicious redirection attacks. Attackers could exploit this vulnerability to redirect users to fraudulent websites to harvest credentials or deliver malware, potentially compromising sensitive corporate or customer data. Although availability is unaffected, the reputational damage and operational disruptions from successful phishing campaigns could be significant. Organizations relying heavily on SAP Document Management System for document workflows and business processes may face increased risk of targeted social engineering attacks. The vulnerability's unauthenticated nature and network accessibility increase the attack surface, especially in environments where SAP systems are exposed to the internet or insufficiently segmented. Given SAP's widespread use in European industries such as manufacturing, finance, and public sector, the threat could affect critical infrastructure and business continuity if exploited in conjunction with other attack vectors.

Mitigation Recommendations

1. Apply SAP-provided patches or updates as soon as they become available to address CVE-2026-0505. 2. Implement strict input validation and output encoding on all URL parameters within BSP applications to prevent unvalidated redirection. 3. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious URL redirection patterns. 4. Restrict direct internet exposure of SAP Document Management System interfaces; use VPNs or secure gateways to limit access. 5. Conduct user awareness training focused on recognizing phishing attempts and suspicious redirects. 6. Monitor logs for unusual redirection activities or access patterns indicative of exploitation attempts. 7. Review and harden SAP system configurations to minimize unnecessary exposure of BSP applications. 8. Use Content Security Policy (CSP) headers to reduce the risk of client-side script exploitation. 9. Regularly audit and update URL parameter handling in custom BSP applications or extensions. 10. Coordinate with SAP support and security advisories to stay informed about patches and emerging threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-12-09T22:06:45.302Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa094b57a58fa1c64ca8

Added to database: 2/10/2026, 3:46:17 AM

Last enriched: 2/17/2026, 9:40:40 AM

Last updated: 2/21/2026, 12:21:36 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats