CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 12, 2026

SAP Patches Critical S/4HANA, Commerce Vulnerabilities

Security Week Archived May 12, 2026 ✓ Full text saved

The flaws could allow attackers to inject malicious code, leading to information disclosure and code execution. The post SAP Patches Critical S/4HANA, Commerce Vulnerabilities appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Enterprise software maker SAP on Tuesday announced the release of 15 new security notes as part of its May 2026 Security Patch Day. The most severe of the resolved vulnerabilities are critical code injection issues in S/4HANA and Commerce that could allow attackers to leak data and execute arbitrary code. Both security defects have a CVSS score of 9.6. Tracked as CVE-2026-34260, the S/4HANA bug is described as an SQL injection issue stemming from missing input validation and sanitization. An authenticated attacker could exploit the weakness to inject malicious SQL statements. The vulnerable code only allows read access to data, and a successful attack would only affect application confidentiality and availability, SAP security firm Onapsis explains. The critical SAP Commerce vulnerability, tracked as CVE-2026-34263, is described as a missing authentication check affecting the cloud configuration. “The vulnerability is caused by an overly permissive security configuration with improper rule ordering, allowing an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution,” Onapsis explains. SAP’s fresh round of patches also resolves a high-severity OS command injection flaw in Forecasting & Replenishment. Tracked as CVE-2026-34259, it could allow authenticated attackers to execute arbitrary operating system commands. The remaining 12 security notes released on SAP’s May 2026 Security Patch Day address medium and low-severity bugs in NetWeaver, S/4HANA, Business Server Pages Application, BusinessObjects, Strategic Enterprise Management, Commerce Cloud, SAPUI5, Financial Consolidation, Incentive and Commission Management, and the HANA Deployment Infrastructure (HDI) deploy library. SAP makes no mention of any of these vulnerabilities being exploited in the wild, but users are advised to apply the patches as soon as possible. The new security notes were released less than two weeks after four SAP NPM packages were injected with malware as part of the Mini Shai-Hulud supply chain attack that affected over 1,800 developers. Related: Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks Related: Cisco Patches High-Severity Vulnerabilities in Enterprise Products Related: SAP Patches Critical ABAP Vulnerability Related: TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack WRITTEN BY Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack Skoda Data Breach Hits Online Shop Customers SailPoint Discloses GitHub Repository Hack Checkmarx Jenkins AST Plugin Compromised in Supply Chain Attack Resurrected ‘Crimenetwork’ Marketplace Taken Down, Administrator Arrested Over 500 Organizations Hit in Years-Long Phishing Campaign AI Firm Braintrust Prompts API Key Rotation After Data Breach ‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials Latest News White Circle Raises $11 Million for AI Control Platform BWH Hotels Says Hackers Had Access to Reservation Data for 6 Months Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware Deal Reached With Hackers to Delete Data Stolen From the Canvas Educational Platform West Pharmaceutical Services Hit by Disruptive Ransomware Attack Apple Patches Dozens of Vulnerabilities in macOS, iOS Claude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really Means Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Trending Webinar: ROSI For CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move Malwarebytes has named Chung Ip as Chief Financial Officer. Semperis has appointed John Podboy as Chief Information Security Officer. Randy Menon has become Chief Product and Marketing Officer at One Identity. More People On The Move Expert Insights Is The SOC Obsolete, And We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents With Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    May 12, 2026
    Archived
    May 12, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗