SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability.
References
Configurations
No configuration.
History
10 Mar 2026, 17:35
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 17:35
Updated : 2026-03-10 17:35
NVD link : CVE-2026-24317
Mitre link : CVE-2026-24317
CVE.ORG link : CVE-2026-24317
JSON object : View
Products Affected
No product.
CWE
CWE-427
Uncontrolled Search Path Element
