CVE-2026-27673
Received Received - Intake
Authorization Bypass in SAP S/4HANA Allows OS File Deletion

Publication date: 2026-04-14

Last updated on: 2026-04-14

Assigner: SAP SE

Description
Due to a missing authorization check, SAP S/4HANA (Private Cloud and On-Premise) allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations which could leads to no impact on Confidentiality, Low impact on Integrity and Availability of the application.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-14
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sap s_4hana *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in SAP S/4HANA (Private Cloud and On-Premise) due to a missing authorization check. It allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations.


How can this vulnerability impact me? :

The impact of this vulnerability includes no impact on Confidentiality, but it has a low impact on both Integrity and Availability of the application. An attacker could delete files on the operating system, potentially disrupting application operations or altering data integrity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations, which impacts the integrity and availability of the application to a low degree, but has no impact on confidentiality.

Since confidentiality is not impacted, the risk to sensitive personal data protected under regulations like GDPR or HIPAA may be limited. However, the ability to alter or delete files could affect system integrity and availability, which might indirectly impact compliance if critical logs or data are lost or tampered with.

Overall, this vulnerability could pose challenges to maintaining compliance with standards that require strict control over data integrity and system availability, but direct effects on confidentiality-related requirements appear minimal based on the provided information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart