{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-40131","assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","state":"PUBLISHED","assignerShortName":"sap","dateReserved":"2026-04-09T17:29:44.663Z","datePublished":"2026-05-12T02:20:56.551Z","dateUpdated":"2026-05-12T13:10:57.852Z"},"containers":{"cna":{"providerMetadata":{"orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap","dateUpdated":"2026-05-12T02:20:56.551Z"},"title":"SQL Injection vulnerability in SAP HANA Deployment Infrastructure (HDI) deploy library","problemTypes":[{"descriptions":[{"lang":"eng","cweId":"CWE-89","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command","type":"CWE"}]}],"affected":[{"vendor":"SAP_SE","product":"SAP HANA Deployment Infrastructure (HDI) deploy library","versions":[{"status":"affected","version":"XS_HDI_DEPLOYER 1.00"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"SQL injection vulnerability exists in @sap/hdi-deploy package, where SQL queries are dynamically constructed using user input without proper parameterization or prepared statements. Successful exploitation could allow the high privileged users to alter the SELECT statements impacting confidentiality and availability of the application. There is no impact on integrity.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>SQL injection vulnerability exists in @sap/hdi-deploy package, where SQL queries are dynamically constructed using user input without proper parameterization or prepared statements. Successful exploitation could allow the high privileged users to alter the SELECT statements impacting confidentiality and availability of the application. There is no impact on integrity.</p>"}]}],"references":[{"url":"https://me.sap.com/notes/3726962"},{"url":"https://url.sap/sapsecuritypatchday"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW","baseSeverity":"LOW","baseScore":3.4,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.2"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-12T13:10:51.330853Z","id":"CVE-2026-40131","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-12T13:10:57.852Z"}}]}}