{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34256","assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","state":"PUBLISHED","assignerShortName":"sap","dateReserved":"2026-03-26T19:02:45.982Z","datePublished":"2026-04-14T00:08:26.993Z","dateUpdated":"2026-04-14T13:14:17.750Z"},"containers":{"cna":{"providerMetadata":{"orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap","dateUpdated":"2026-04-14T00:08:26.993Z"},"title":"Missing Authorization check in SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise)","problemTypes":[{"descriptions":[{"lang":"eng","cweId":"CWE-862","description":"CWE-862: Missing Authorization","type":"CWE"}]}],"affected":[{"vendor":"SAP_SE","product":"SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise)","versions":[{"status":"affected","version":"SAP_FIN 618"},{"status":"affected","version":"720"},{"status":"affected","version":"730"},{"status":"affected","version":"EA-FIN 617"},{"status":"affected","version":"700"},{"status":"affected","version":"SAPSCORE 135"},{"status":"affected","version":"S4CORE 102"},{"status":"affected","version":"103"},{"status":"affected","version":"104"},{"status":"affected","version":"105"},{"status":"affected","version":"106"},{"status":"affected","version":"107"},{"status":"affected","version":"108"},{"status":"affected","version":"109"},{"status":"affected","version":"EA-APPL 600"},{"status":"affected","version":"602"},{"status":"affected","version":"603"},{"status":"affected","version":"604"},{"status":"affected","version":"605"},{"status":"affected","version":"606"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization. If the overwritten report is subsequently executed, the intended functionality could become unavailable. Successful exploitation impacts availability, with a limited impact on integrity confined to the affected report, while confidentiality remains unaffected.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization. If the overwritten report is subsequently executed, the intended functionality could become unavailable. Successful exploitation impacts availability, with a limited impact on integrity confined to the affected report, while confidentiality remains unaffected.</p>"}]}],"references":[{"url":"https://me.sap.com/notes/3731908"},{"url":"https://url.sap/sapsecuritypatchday"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":7.1,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-34256","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-04-14T12:53:55.826414Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-14T13:14:17.750Z"}}]}}