Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0513: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP Supplier Relationship Management (SICF Handler in SRM Catalog)

0
Medium
VulnerabilityCVE-2026-0513cvecve-2026-0513cwe-601
Published: Tue Jan 13 2026 (01/13/2026, 01:15:57 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Supplier Relationship Management (SICF Handler in SRM Catalog)

Description

Due to an Open Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL that, if accessed by a victim, redirects them to an attacker-controlled site.This causes low impact on integrity of the application. Confidentiality and availability are not impacted.

AI-Powered Analysis

AILast updated: 01/13/2026, 01:58:07 UTC

Technical Analysis

CVE-2026-0513 is an open redirect vulnerability classified under CWE-601 found in the SAP Supplier Relationship Management (SRM) system, specifically within the SICF Handler component of the SRM Catalog. This vulnerability allows an unauthenticated attacker to craft a malicious URL that, when accessed by a victim, causes the application to redirect the user to an attacker-controlled external site. The vulnerability arises due to insufficient validation or sanitization of URL parameters used in redirection logic, enabling the attacker to manipulate the destination URL. The vulnerability affects multiple versions of SAP SRM, including 700, 701, 702, 713, and 714. The CVSS v3.1 base score is 4.7, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N. This means the attack can be performed remotely without privileges but requires user interaction (clicking the malicious link). The impact is limited to integrity, as the redirect could lead users to phishing or malware sites, potentially damaging the trustworthiness of the application or leading to further attacks. Confidentiality and availability are not impacted. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The open redirect can be leveraged in social engineering campaigns to trick users into visiting malicious sites, potentially leading to credential theft or malware infection. Given the critical role of SAP SRM in supply chain and procurement processes, exploitation could indirectly affect business operations and partner trust.

Potential Impact

For European organizations, especially those heavily reliant on SAP SRM for procurement and supplier management, this vulnerability poses a risk primarily through social engineering and phishing attacks. Attackers can exploit the open redirect to craft convincing URLs that appear to originate from trusted SAP portals, increasing the likelihood of users clicking malicious links. This can lead to credential compromise or malware infections if users are redirected to malicious sites. While the vulnerability does not directly compromise data confidentiality or system availability, the indirect consequences can include reputational damage, loss of supplier trust, and potential financial fraud. Organizations in sectors with complex supply chains, such as manufacturing, automotive, pharmaceuticals, and retail, may face higher risks due to the criticality of SAP SRM in their operations. Additionally, the cross-site nature of the redirect can facilitate broader attack campaigns targeting multiple organizations or partners within the European supply ecosystem.

Mitigation Recommendations

1. Implement strict validation and whitelisting of redirect URLs within the SAP SRM SICF Handler configuration to ensure only trusted internal URLs are allowed for redirection. 2. Apply SAP security notes and patches as they become available for the affected SRM versions; monitor SAP security advisories closely. 3. Configure web application firewalls (WAFs) to detect and block suspicious redirect patterns or external URLs in SRM traffic. 4. Conduct user awareness training focused on phishing and social engineering risks, emphasizing caution with URLs received via email or external sources. 5. Monitor logs for unusual redirect requests or spikes in traffic to external domains originating from SAP SRM portals. 6. Consider implementing multi-factor authentication (MFA) on SAP SRM access to reduce the impact of credential theft resulting from phishing. 7. Review and restrict public exposure of SAP SRM interfaces to minimize attack surface, using VPNs or secure gateways where possible. 8. Collaborate with suppliers and partners to share threat intelligence and ensure consistent security postures across the supply chain.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-12-09T22:06:51.573Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6965a2cda60475309fcd6853

Added to database: 1/13/2026, 1:41:33 AM

Last enriched: 1/13/2026, 1:58:07 AM

Last updated: 2/7/2026, 12:39:10 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats