CVE-2026-24318
Received Received - Intake
Insecure Session Management in SAP BusinessObjects Enables Unauthorized Access

Publication date: 2026-04-14

Last updated on: 2026-04-14

Assigner: SAP SE

Description
Due to an Insecure session management vulnerability in SAP Business Objects Business Intelligence Platform, an unauthenticated attacker could obtain valid session tokens and reuse them to gain unauthorized access to a victimοΏ½s session. If the application continues to accept previously issued tokens after authentication, the attacker could assume the victimοΏ½s authenticated context. This could allow the attacker to access or modify information within the victimοΏ½s session scope, impacting confidentiality and integrity, while availability remains unaffected.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-14
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sap business_objects_business_intelligence_platform *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-539 The web application uses persistent cookies, but the cookies contain sensitive information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an insecure session management issue in SAP Business Objects Business Intelligence Platform. It allows an unauthenticated attacker to obtain valid session tokens and reuse them to gain unauthorized access to a victim's session.

If the application accepts previously issued tokens after authentication, the attacker can assume the victim's authenticated context.

This means the attacker could access or modify information within the victim's session scope.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker to gain unauthorized access to your session, potentially accessing or modifying confidential information.

This impacts the confidentiality and integrity of your data within the affected session.

However, availability of the system remains unaffected.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an unauthenticated attacker to obtain and reuse valid session tokens to gain unauthorized access to a victim's session, potentially accessing or modifying confidential information. Such unauthorized access and potential data exposure could impact the confidentiality and integrity of sensitive data.

While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, the impact on confidentiality and integrity of information within user sessions could lead to violations of these regulations, which require protection of personal and sensitive data against unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart