CVE-2026-27678
Received Received - Intake
Authorization Bypass in SAP S/4HANA OData Service Enables Data Tampering

Publication date: 2026-04-14

Last updated on: 2026-04-14

Assigner: SAP SE

Description
Due to missing authorization checks in the SAP S/4HANA backend OData Service (Manage Reference Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-14
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sap s_4hana *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists due to missing authorization checks in the SAP S/4HANA backend OData Service called Manage Reference Structures. Because of this, an attacker with some level of privileges could update and delete child entities through exposed OData services without proper authorization.

The vulnerability primarily impacts data integrity, meaning unauthorized changes can be made to data. However, confidentiality and availability are not affected.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability impacts the integrity of data by allowing unauthorized updates and deletions of child entities via exposed OData services in SAP S/4HANA. While confidentiality and availability are not affected, the integrity impact could lead to non-compliance with standards and regulations that require strict data integrity controls, such as GDPR and HIPAA.

Specifically, regulations like GDPR and HIPAA mandate that organizations ensure the accuracy and integrity of personal and sensitive data. Unauthorized modification or deletion of data could violate these requirements, potentially resulting in compliance issues.


How can this vulnerability impact me? :

The main impact of this vulnerability is on the integrity of your data. An attacker could modify or delete child entities in the SAP S/4HANA system without proper authorization, potentially leading to corrupted or lost data.

Since confidentiality and availability are not impacted, the risk does not include unauthorized data disclosure or denial of service, but the unauthorized data modification could disrupt business processes or cause incorrect data to be used.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart