SAP on Tuesday announced the release of 27 new and updated security notes, including two that address critical-severity vulnerabilities.
The first critical security note released on SAP’s February 2026 security patch day addresses CVE-2026-0488 (CVSS score of 9.9), a code injection bug in CRM and S/4HANA.
Impacting the Scripting Editor component of the applications, the flaw can be exploited by authenticated attackers to execute arbitrary SQL statements.
“A successful exploit can lead to a full compromise of the database with high impact on confidentiality, integrity, and availability of the application,” enterprise application security firm Onapsis explains.
The second critical security note that SAP released today resolves CVE-2026-0509 (CVSS score of 9.6), a missing authorization check in NetWeaver Application Server ABAP and ABAP Platform.
“Under certain circumstances, an authenticated, low-privileged user can perform background remote function calls without the required S_RFC authorization,” Onapsis explains.
This month, SAP released seven new security notes that resolve high-severity security defects in NetWeaver, Supply Chain Management, Solution Tools Plug-In (ST-PI), BusinessObjects, and Commerce Cloud.
These include an XML signature wrapping issue in NetWeaver that could allow attackers to send signed XML documents that, once accepted, could expose sensitive user information and could potentially lead to system usage disruption.
The remaining high-severity vulnerabilities resolved this month include a missing authorization check, a race condition, an open redirect, and three denial-of-service (DoS) issues.
The other security notes resolve medium- and low-severity flaws in NetWeaver, BusinessObjects, Document Management System, Business Server Pages Application, Commerce Cloud, Business One, Business Workflow, ABAP-based SAP systems, Fiori App, Support Tools Plug-In, S/4HANA, and Strategic Enterprise Management.
SAP makes no mention of any of these vulnerabilities being exploited in the wild, but users are advised to update their deployments as soon as possible.
Related: BeyondTrust Patches Critical RCE Vulnerability
Related: Recent SolarWinds Flaws Potentially Exploited as Zero-Days
Related: APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability
Related: High-Severity Remote Code Execution Vulnerability Patched in OpenSSL

