CVE-2026-0513: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP Supplier Relationship Management (SICF Handler in SRM Catalog)
Due to an Open Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL that, if accessed by a victim, redirects them to an attacker-controlled site.This causes low impact on integrity of the application. Confidentiality and availability are not impacted.
AI Analysis
Technical Summary
CVE-2026-0513 is an open redirect vulnerability classified under CWE-601 found in the SAP Supplier Relationship Management (SRM) system, specifically within the SICF Handler component of the SRM Catalog. This vulnerability allows an unauthenticated attacker to craft a malicious URL that, when accessed by a victim, causes the application to redirect the user to an attacker-controlled external site. The vulnerability arises due to insufficient validation or sanitization of URL parameters used in redirection logic, enabling the attacker to manipulate the destination URL. The vulnerability affects multiple versions of SAP SRM, including 700, 701, 702, 713, and 714. The CVSS v3.1 base score is 4.7, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N. This means the attack can be performed remotely without privileges but requires user interaction (clicking the malicious link). The impact is limited to integrity, as the redirect could lead users to phishing or malware sites, potentially damaging the trustworthiness of the application or leading to further attacks. Confidentiality and availability are not impacted. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The open redirect can be leveraged in social engineering campaigns to trick users into visiting malicious sites, potentially leading to credential theft or malware infection. Given the critical role of SAP SRM in supply chain and procurement processes, exploitation could indirectly affect business operations and partner trust.
Potential Impact
For European organizations, especially those heavily reliant on SAP SRM for procurement and supplier management, this vulnerability poses a risk primarily through social engineering and phishing attacks. Attackers can exploit the open redirect to craft convincing URLs that appear to originate from trusted SAP portals, increasing the likelihood of users clicking malicious links. This can lead to credential compromise or malware infections if users are redirected to malicious sites. While the vulnerability does not directly compromise data confidentiality or system availability, the indirect consequences can include reputational damage, loss of supplier trust, and potential financial fraud. Organizations in sectors with complex supply chains, such as manufacturing, automotive, pharmaceuticals, and retail, may face higher risks due to the criticality of SAP SRM in their operations. Additionally, the cross-site nature of the redirect can facilitate broader attack campaigns targeting multiple organizations or partners within the European supply ecosystem.
Mitigation Recommendations
1. Implement strict validation and whitelisting of redirect URLs within the SAP SRM SICF Handler configuration to ensure only trusted internal URLs are allowed for redirection. 2. Apply SAP security notes and patches as they become available for the affected SRM versions; monitor SAP security advisories closely. 3. Configure web application firewalls (WAFs) to detect and block suspicious redirect patterns or external URLs in SRM traffic. 4. Conduct user awareness training focused on phishing and social engineering risks, emphasizing caution with URLs received via email or external sources. 5. Monitor logs for unusual redirect requests or spikes in traffic to external domains originating from SAP SRM portals. 6. Consider implementing multi-factor authentication (MFA) on SAP SRM access to reduce the impact of credential theft resulting from phishing. 7. Review and restrict public exposure of SAP SRM interfaces to minimize attack surface, using VPNs or secure gateways where possible. 8. Collaborate with suppliers and partners to share threat intelligence and ensure consistent security postures across the supply chain.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2026-0513: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP Supplier Relationship Management (SICF Handler in SRM Catalog)
Description
Due to an Open Redirect Vulnerability in SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL that, if accessed by a victim, redirects them to an attacker-controlled site.This causes low impact on integrity of the application. Confidentiality and availability are not impacted.
AI-Powered Analysis
Technical Analysis
CVE-2026-0513 is an open redirect vulnerability classified under CWE-601 found in the SAP Supplier Relationship Management (SRM) system, specifically within the SICF Handler component of the SRM Catalog. This vulnerability allows an unauthenticated attacker to craft a malicious URL that, when accessed by a victim, causes the application to redirect the user to an attacker-controlled external site. The vulnerability arises due to insufficient validation or sanitization of URL parameters used in redirection logic, enabling the attacker to manipulate the destination URL. The vulnerability affects multiple versions of SAP SRM, including 700, 701, 702, 713, and 714. The CVSS v3.1 base score is 4.7, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N. This means the attack can be performed remotely without privileges but requires user interaction (clicking the malicious link). The impact is limited to integrity, as the redirect could lead users to phishing or malware sites, potentially damaging the trustworthiness of the application or leading to further attacks. Confidentiality and availability are not impacted. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The open redirect can be leveraged in social engineering campaigns to trick users into visiting malicious sites, potentially leading to credential theft or malware infection. Given the critical role of SAP SRM in supply chain and procurement processes, exploitation could indirectly affect business operations and partner trust.
Potential Impact
For European organizations, especially those heavily reliant on SAP SRM for procurement and supplier management, this vulnerability poses a risk primarily through social engineering and phishing attacks. Attackers can exploit the open redirect to craft convincing URLs that appear to originate from trusted SAP portals, increasing the likelihood of users clicking malicious links. This can lead to credential compromise or malware infections if users are redirected to malicious sites. While the vulnerability does not directly compromise data confidentiality or system availability, the indirect consequences can include reputational damage, loss of supplier trust, and potential financial fraud. Organizations in sectors with complex supply chains, such as manufacturing, automotive, pharmaceuticals, and retail, may face higher risks due to the criticality of SAP SRM in their operations. Additionally, the cross-site nature of the redirect can facilitate broader attack campaigns targeting multiple organizations or partners within the European supply ecosystem.
Mitigation Recommendations
1. Implement strict validation and whitelisting of redirect URLs within the SAP SRM SICF Handler configuration to ensure only trusted internal URLs are allowed for redirection. 2. Apply SAP security notes and patches as they become available for the affected SRM versions; monitor SAP security advisories closely. 3. Configure web application firewalls (WAFs) to detect and block suspicious redirect patterns or external URLs in SRM traffic. 4. Conduct user awareness training focused on phishing and social engineering risks, emphasizing caution with URLs received via email or external sources. 5. Monitor logs for unusual redirect requests or spikes in traffic to external domains originating from SAP SRM portals. 6. Consider implementing multi-factor authentication (MFA) on SAP SRM access to reduce the impact of credential theft resulting from phishing. 7. Review and restrict public exposure of SAP SRM interfaces to minimize attack surface, using VPNs or secure gateways where possible. 8. Collaborate with suppliers and partners to share threat intelligence and ensure consistent security postures across the supply chain.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-12-09T22:06:51.573Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6965a2cda60475309fcd6853
Added to database: 1/13/2026, 1:41:33 AM
Last enriched: 1/13/2026, 1:58:07 AM
Last updated: 2/7/2026, 12:39:10 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.