CVE-2026-0500

Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
References
Link Resource
https://me.sap.com/notes/3668679 Permissions Required
https://url.sap/sapsecuritypatchday Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:introscope_enterprise_manager:10.8:*:*:*:*:*:*:*

History

22 Jan 2026, 18:47

Type Values Removed Values Added
First Time Sap
Sap introscope Enterprise Manager
CPE cpe:2.3:a:sap:introscope_enterprise_manager:10.8:*:*:*:*:*:*:*
References () https://me.sap.com/notes/3668679 - () https://me.sap.com/notes/3668679 - Permissions Required
References () https://url.sap/sapsecuritypatchday - () https://url.sap/sapsecuritypatchday - Patch, Vendor Advisory

13 Jan 2026, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-13 02:15

Updated : 2026-01-22 18:47


NVD link : CVE-2026-0500

Mitre link : CVE-2026-0500

CVE.ORG link : CVE-2026-0500


JSON object : View

Products Affected

sap

  • introscope_enterprise_manager
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')