{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-27681","assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","state":"PUBLISHED","assignerShortName":"sap","dateReserved":"2026-02-23T17:50:17.027Z","datePublished":"2026-04-14T00:08:05.791Z","dateUpdated":"2026-04-14T13:14:18.028Z"},"containers":{"cna":{"providerMetadata":{"orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap","dateUpdated":"2026-04-14T00:08:05.791Z"},"title":"SQL Injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse","problemTypes":[{"descriptions":[{"lang":"eng","cweId":"CWE-89","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command","type":"CWE"}]}],"affected":[{"vendor":"SAP_SE","product":"SAP Business Planning and Consolidation and SAP Business Warehouse","versions":[{"status":"affected","version":"HANABPC 810"},{"status":"affected","version":"BPC4HANA 300"},{"status":"affected","version":"SAP_BW 750"},{"status":"affected","version":"752"},{"status":"affected","version":"753"},{"status":"affected","version":"754"},{"status":"affected","version":"755"},{"status":"affected","version":"756"},{"status":"affected","version":"757"},{"status":"affected","version":"758"},{"status":"affected","version":"816"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system.</p>"}]}],"references":[{"url":"https://me.sap.com/notes/3719353"},{"url":"https://url.sap/sapsecuritypatchday"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"CRITICAL","baseScore":9.9,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-27681","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-04-14T12:54:23.920893Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-14T13:14:18.028Z"}}]}}