CVE-2026-23686
CRLF Injection in SAP NetWeaver AS Java Allows Integrity Manipulation
Publication date: 2026-02-10
Last updated on: 2026-02-17
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | netweaver_application_server_java | 7.50 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-436 | Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state. |
| CWE-113 | The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a CRLF Injection in SAP NetWeaver Application Server Java. It allows an authenticated attacker with administrative access to submit specially crafted content to the application. When processed, this content can inject untrusted entries into the generated configuration, enabling manipulation of application-controlled settings.
How can this vulnerability impact me? :
Successful exploitation of this vulnerability results in a low impact on the integrity of the application. However, confidentiality and availability are not affected.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know