Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0508: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP BusinessObjects Business Intelligence Platform

0
High
VulnerabilityCVE-2026-0508cvecve-2026-0508cwe-601
Published: Tue Feb 10 2026 (02/10/2026, 03:01:41 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP BusinessObjects Business Intelligence Platform

Description

CVE-2026-0508 is a high-severity vulnerability in SAP BusinessObjects Business Intelligence Platform that allows an authenticated attacker with high privileges to insert malicious URLs leading to unvalidated redirects to attacker-controlled domains. Exploitation requires user interaction, where a victim clicks the malicious link, potentially resulting in the download of malicious content. This vulnerability impacts confidentiality and integrity but does not affect availability. It affects multiple versions including ENTERPRISE 430, 2025, and 2027. The CVSS score is 7. 3, indicating a high risk. No known exploits are currently reported in the wild. European organizations using affected SAP versions should prioritize patching and implement strict URL validation and user awareness measures to mitigate risks. Countries with significant SAP deployments and critical infrastructure reliance on SAP BI platforms are most at risk.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:25:38 UTC

Technical Analysis

CVE-2026-0508 is a vulnerability classified under CWE-601 (URL Redirection to Untrusted Site) affecting SAP BusinessObjects Business Intelligence Platform versions ENTERPRISE 430, 2025, and 2027. The flaw allows an authenticated attacker with high privileges to insert malicious URLs within the application. When a victim user clicks on such a URL, the application redirects them to an attacker-controlled domain without proper validation. This redirection can lead to the victim downloading malicious content, potentially compromising the confidentiality and integrity of the system and user data. The vulnerability requires both high privilege authentication and user interaction, which limits but does not eliminate the risk. The CVSS 3.1 base score of 7.3 reflects the significant impact on confidentiality and integrity, with no impact on availability. The vulnerability is particularly dangerous in environments where SAP BusinessObjects is used for sensitive business intelligence and reporting, as attackers could leverage this to deliver malware or conduct phishing attacks within trusted enterprise environments. No patches or exploits are currently documented, but the vulnerability is publicly known and should be addressed proactively.

Potential Impact

For European organizations, the impact of CVE-2026-0508 can be substantial, especially in sectors relying heavily on SAP BusinessObjects for business intelligence, such as finance, manufacturing, and public administration. Successful exploitation could lead to unauthorized disclosure of sensitive business data, manipulation of reports, or introduction of malware through malicious downloads, undermining data integrity and confidentiality. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations), reputational damage, and operational disruptions. The requirement for high privilege authentication limits exposure but insider threats or compromised credentials could facilitate exploitation. The lack of availability impact means systems remain operational but potentially compromised, complicating detection and response efforts. European organizations with complex SAP landscapes and extensive user bases are at increased risk due to the potential scale of impact.

Mitigation Recommendations

To mitigate CVE-2026-0508, European organizations should: 1) Apply SAP security patches as soon as they become available, even though none are currently published, monitor SAP security advisories closely. 2) Restrict high privilege access to SAP BusinessObjects to only essential personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3) Implement strict input validation and URL filtering within the SAP environment to detect and block malicious URLs. 4) Conduct user awareness training emphasizing the risks of clicking unknown or suspicious links, especially within trusted enterprise applications. 5) Monitor logs and network traffic for unusual redirect patterns or downloads originating from SAP BI platform interactions. 6) Employ endpoint protection solutions capable of detecting and blocking malicious downloads resulting from redirected URLs. 7) Consider network segmentation to isolate SAP BI systems and limit exposure if compromise occurs. 8) Regularly review and audit SAP user privileges to minimize the risk of privilege misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-12-09T22:06:47.660Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698aaa094b57a58fa1c64cac

Added to database: 2/10/2026, 3:46:17 AM

Last enriched: 2/17/2026, 9:25:38 AM

Last updated: 2/21/2026, 12:18:15 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats