Due to a CRLF Injection vulnerability in SAP NetWeaver Application Server Java, an authenticated attacker with administrative access could submit specially crafted content to the application. If processed by the application, this content enables injection of untrusted entries into generated configuration, allowing manipulation of application-controlled settings. Successful exploitation leads to a low impact on integrity, while confidentiality and availability remain unaffected.
References
| Link | Resource |
|---|---|
| https://me.sap.com/notes/3673213 | Permissions Required |
| https://url.sap/sapsecuritypatchday | Vendor Advisory |
Configurations
History
17 Feb 2026, 16:03
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Sap netweaver Application Server Java
Sap |
|
| References | () https://me.sap.com/notes/3673213 - Permissions Required | |
| References | () https://url.sap/sapsecuritypatchday - Vendor Advisory | |
| CWE | CWE-436 | |
| CPE | cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:* | |
| Summary |
|
10 Feb 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 04:16
Updated : 2026-02-17 16:03
NVD link : CVE-2026-23686
Mitre link : CVE-2026-23686
CVE.ORG link : CVE-2026-23686
JSON object : View
Products Affected
sap
- netweaver_application_server_java
