CVE-2026-24318
Insecure Session Management in SAP BusinessObjects Enables Unauthorized Access
Publication date: 2026-04-14
Last updated on: 2026-04-14
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | business_objects_business_intelligence_platform | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-539 | The web application uses persistent cookies, but the cookies contain sensitive information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an insecure session management issue in SAP Business Objects Business Intelligence Platform. It allows an unauthenticated attacker to obtain valid session tokens and reuse them to gain unauthorized access to a victim's session.
If the application accepts previously issued tokens after authentication, the attacker can assume the victim's authenticated context.
This means the attacker could access or modify information within the victim's session scope.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker to gain unauthorized access to your session, potentially accessing or modifying confidential information.
This impacts the confidentiality and integrity of your data within the affected session.
However, availability of the system remains unaffected.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unauthenticated attacker to obtain and reuse valid session tokens to gain unauthorized access to a victim's session, potentially accessing or modifying confidential information. Such unauthorized access and potential data exposure could impact the confidentiality and integrity of sensitive data.
While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, the impact on confidentiality and integrity of information within user sessions could lead to violations of these regulations, which require protection of personal and sensitive data against unauthorized access.