Multiple vulnerabilities have been reported in SAP products which could allow an attacker to perform SQL injection, code injection, cross-site scripting (XSS), open redirect attacks, information disclosure, and bypass authorization checks, or execute arbitrary commands and cause denial of service (DoS) conditions on the targeted system.
Target Audience:
SAP administrators, SAP security and IT infrastructure teams, and application developers managing or supporting affected SAP systems.
Risk Assessment:
High risk of unauthorized access, data manipulation, service disruption, and redirection of users to malicious resources.
Impact Assessment:
Potential remote code execution, data compromise, and system takeover.
The information provided herein is on "as is" basis, without warranty of any kind.