CVE-2026-24323

The BSP applications allow an unauthenticated user to inject malicious script content via user-controlled URL parameters that are not sufficiently sanitized. When a victim accesses a crafted URL, the injected script is executed in the victim�s browser, leading to a low impact on confidentiality and integrity, and no impact on the availability of the application.
References
Link Resource
https://me.sap.com/notes/3678417 Permissions Required
https://url.sap/sapsecuritypatchday Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:document_management_system:600:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:602:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:603:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:604:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:605:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:606:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:617:*:*:*:*:*:*:*
cpe:2.3:a:sap:erp:618:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:102:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:103:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:106:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:108:*:*:*:*:*:*:*

History

17 Feb 2026, 15:15

Type Values Removed Values Added
First Time Sap document Management System
Sap s4core
Sap
Sap erp
CPE cpe:2.3:a:sap:document_management_system:605:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:602:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:108:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:102:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:103:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:603:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:606:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:106:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:617:*:*:*:*:*:*:*
cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:604:*:*:*:*:*:*:*
cpe:2.3:a:sap:erp:618:*:*:*:*:*:*:*
cpe:2.3:a:sap:document_management_system:600:*:*:*:*:*:*:*
Summary
  • (es) Las aplicaciones BSP permiten a un usuario no autenticado inyectar contenido de script malicioso a través de parámetros de URL controlados por el usuario que no están suficientemente saneados. Cuando una víctima accede a una URL manipulada, el script inyectado se ejecuta en el navegador de la víctima, lo que conlleva un impacto bajo en la confidencialidad y la integridad, y ningún impacto en la disponibilidad de la aplicación.
References () https://me.sap.com/notes/3678417 - () https://me.sap.com/notes/3678417 - Permissions Required
References () https://url.sap/sapsecuritypatchday - () https://url.sap/sapsecuritypatchday - Vendor Advisory

10 Feb 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-10 04:16

Updated : 2026-02-17 15:15


NVD link : CVE-2026-24323

Mitre link : CVE-2026-24323

CVE.ORG link : CVE-2026-24323


JSON object : View

Products Affected

sap

  • document_management_system
  • erp
  • s4core
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')