{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-27675","assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","state":"PUBLISHED","assignerShortName":"sap","dateReserved":"2026-02-23T17:50:10.513Z","datePublished":"2026-04-14T00:07:01.278Z","dateUpdated":"2026-04-14T13:14:18.764Z"},"containers":{"cna":{"providerMetadata":{"orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap","dateUpdated":"2026-04-14T00:07:01.278Z"},"title":"Code Injection vulnerability in SAP Landscape Transformation","problemTypes":[{"descriptions":[{"lang":"eng","cweId":"CWE-94","description":"CWE-94: Improper Control of Generation of Code","type":"CWE"}]}],"affected":[{"vendor":"SAP_SE","product":"SAP Landscape Transformation","versions":[{"status":"affected","version":"DMIS 2011_1_700"},{"status":"affected","version":"2011_1_710"},{"status":"affected","version":"2011_1_730"},{"status":"affected","version":"2011_1_731"},{"status":"affected","version":"2011_1_752"},{"status":"affected","version":"2020"},{"status":"affected","version":"S4CORE 102"},{"status":"affected","version":"103"},{"status":"affected","version":"104"},{"status":"affected","version":"105"},{"status":"affected","version":"106"},{"status":"affected","version":"107"},{"status":"affected","version":"108"},{"status":"affected","version":"109"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"SAP Landscape Transformation contains a vulnerability in an RFC-exposed function module that could allow a high privileged adversary to inject arbitrary ABAP code and operating system commands. Due to this, some information could be modified, but the attacker does not have control over kind or degree. This leads to a low impact on integrity, while confidentiality and availability are not impacted.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>SAP Landscape Transformation contains a vulnerability in an RFC-exposed function module that could allow a high privileged adversary to inject arbitrary ABAP code and operating system commands. Due to this, some information could be modified, but the attacker does not have control over kind or degree. This leads to a low impact on integrity, while confidentiality and availability are not impacted.</p>"}]}],"references":[{"url":"https://me.sap.com/notes/3723097"},{"url":"https://url.sap/sapsecuritypatchday"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseSeverity":"LOW","baseScore":2,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-27675","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-04-14T12:55:15.514456Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-14T13:14:18.764Z"}}]}}