CVE-2026-24313
Authorization Bypass in SAP ST-PI Leading to Information Disclosure
Publication date: 2026-03-10
Last updated on: 2026-03-10
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | solution_tools_plug_in | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SAP Solution Tools Plug-In (ST-PI), where a function module does not perform the necessary authorization checks for authenticated users.
As a result, authenticated users can access system information that should normally be restricted.
The impact on confidentiality is low, and the vulnerability does not affect the integrity or availability of the system.
How can this vulnerability impact me? :
The vulnerability allows authenticated users to disclose system information without proper authorization.
This could lead to limited exposure of confidential information, but it does not compromise the integrity or availability of the system.
Overall, the impact is considered low.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know