CVE-2026-27673
Authorization Bypass in SAP S/4HANA Allows OS File Deletion
Publication date: 2026-04-14
Last updated on: 2026-04-14
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | s_4hana | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in SAP S/4HANA (Private Cloud and On-Premise) due to a missing authorization check. It allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations.
How can this vulnerability impact me? :
The impact of this vulnerability includes no impact on Confidentiality, but it has a low impact on both Integrity and Availability of the application. An attacker could delete files on the operating system, potentially disrupting application operations or altering data integrity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations, which impacts the integrity and availability of the application to a low degree, but has no impact on confidentiality.
Since confidentiality is not impacted, the risk to sensitive personal data protected under regulations like GDPR or HIPAA may be limited. However, the ability to alter or delete files could affect system integrity and availability, which might indirectly impact compliance if critical logs or data are lost or tampered with.
Overall, this vulnerability could pose challenges to maintaining compliance with standards that require strict control over data integrity and system availability, but direct effects on confidentiality-related requirements appear minimal based on the provided information.